Last Update: Sep 07, 2023
Building in disaster recovery protection from ransomware is a key step to making sure that when, not if, your company is impacted by these viruses that you remain protected.
Last Update: Sep 07, 2023
Endpoint security plays a vital role in safeguarding enterprise cybersecurity, particularly in the context of remote work scenarios. As the number of endpoints accessing corporate networks rises with the growth of remote work, the need for robust endpoint security becomes increasingly paramount, enabling a secure environment for users on the move. In this article, I…
Last Update: Sep 07, 2023
Security Management with Microsoft Defender for Endpoint is a new feature that can be used to apply security configuration to devices that do not enroll into Microsoft Endpoint Manager. In this scenario, Microsoft Defender for Endpoint retrieves, enforces, and reports on policies deployed via Microsoft Endpoint Manager. The devices are joined to your Azure Active…
Last Update: Sep 07, 2023
Microsoft Defender for Endpoint for iOS and Android devices is a mobile threat defense solution (MTD). Most organizations are in agreement that Windows devices require some form of antivirus and antimalware solution in order to be considered secure. Very few organizations, however, consider iOS and Android as platforms that require threat protection. Whilst iOS and…
Last Update: Sep 07, 2023
Microsoft Defender for Endpoint (MDE, previously known as Microsoft Defender Advanced Threat Protection) is Microsoft’s endpoint security platform that goes far and beyond the traditional anti-malware engine and firewall to protect against the modern cybersecurity threats an organization faces. An evolving solution since it was first announced in 2016, MDE is part of the Microsoft…
Last Update: Aug 30, 2023
Microsoft Defender for Endpoint has announced that Device isolation and Antivirus scanning capabilities are now available in preview for macOS and Linux devices. The new response actions should help to protect organizations against security threats. The device isolation feature blocks the compromised device from connecting to the corporate network. Meanwhile, Microsoft Defender for Endpoint continues…
Last Update: Aug 29, 2023
Zero Trust is a security model that can be applied to Microsoft 365. It focuses on improving security by verifying and testing both the identity and device before granting access to resources. You can think of Zero Trust as a way of working, wherein you take it for granted that every user and device accessing…
Last Update: Aug 29, 2023
After the successful SolarWinds attack in 2020 where attackers gained access to Microsoft’s systems, Microsoft changed its approach and aligned with the National Institute of Standards and Technology’s (NIST) zero trust architecture. In this article, we’re going to detail how Microsoft’s zero trust approach leverages Azure Active Directory and Identity and Access Management to enable cloud…
Last Update: Aug 23, 2023
Hackers are targeting unpatched Microsoft systems with publicly available SMBGhost PoC code.
Microsoft has fixed a critical vulnerability that could let hackers gain unauthorized access to sensitive data and cross-tenant applications managed by Azure AD. The fix comes shortly after security researchers criticized Microsoft for its “grossly irresponsible” cybersecurity practices. In a post on LinkedIn, Amit Yoran, the CEO of the security firm Tenable, called out Microsoft…