Gartner has named Microsoft a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. The post Microsoft is named a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms appeared first on Microsoft Security Blog. This…
Category: Microsoft Security Blog
5 ways to secure identity and access for 2024
To confidently secure identity and access at your organization, here are five areas Microsoft recommends prioritizing in the new year. The post 5 ways to secure identity and access for 2024 appeared first on Microsoft Security Blog. This article has…
Financially motivated threat actors misusing App Installer
Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, including financially motivated actors like Storm-0569, Storm-1113, Sangria Tempest, and Storm-1674, utilizing the ms-appinstaller URI scheme (App Installer) to distribute malware. The post Financially motivated threat actors misusing App Installer…
How Strata Identity and Microsoft Entra ID solve identity challenges in mergers and acquisitions
Along with every merger and acquisition between two companies comes the need to combine and strengthen their IT infrastructure. There is an immediate and profound impact on the identity and access management postures of both companies. Learn how to protect…
Patching Perforce perforations: Critical RCE vulnerability discovered in Perforce Helix Core Server
Four new unauthenticated remotely exploitable security vulnerabilities discovered in the popular source code management platform Perforce Helix Core Server have been remediated after being responsibly disclosed by Microsoft. Perforce Server customers are strongly urged to update to version 2023.1/2513900. The…
Strengthening identity protection in the face of highly sophisticated attacks
Get the latest information on our engineering advancements and continued commitments to secure identities as part of the Secure Future Initiative. The post Strengthening identity protection in the face of highly sophisticated attacks appeared first on Microsoft Security Blog. This…
Threat actors misuse OAuth applications to automate financially driven attacks
Microsoft Threat Intelligence presents cases of threat actors misusing OAuth applications as automation tools in financially motivated attacks. The post Threat actors misuse OAuth applications to automate financially driven attacks appeared first on Microsoft Security Blog. This article has been…
New Microsoft Incident Response team guide shares best practices for security teams and leaders
The Microsoft Incident Response team shares a downloadable, interactive, people-centric, guide to effective incident response. The post New Microsoft Incident Response team guide shares best practices for security teams and leaders appeared first on Microsoft Security Blog. This article has…
New Microsoft Purview features use AI to help secure and govern all your data
Learn about the new Microsoft Purview features and capabilities announced at Microsoft Ignite 2023. The post New Microsoft Purview features use AI to help secure and govern all your data appeared first on Microsoft Security Blog. This article has been…
Microsoft Security Copilot drives new product integrations at Microsoft Ignite to empower security and IT teams
Microsoft Security Copilot offers several use cases and embedded experiences—and early access participants are already sharing their perspectives on the solution. Find out for yourself by joining the program. The post Microsoft Security Copilot drives new product integrations at Microsoft…