Skip to main content
Microsoft Security

Microsoft Secure Blog Staff Posts

Microsoft Secure Blog Staff

Tips for protecting your information and privacy against cybersecurity threats 

This post is authored by Steven Meyers, security operations principal, Microsoft Cyber Defense Operations Center. Introducing a new video on best practices from the Microsoft Cyber Defense Operations Center In 2016, 4.2+ billion records were stolen by hackers. The number of cyberattacks and breaches in 2017 have risen 30 percent. The business sector leads in […]

Published
1 minute read

TLS 1.2 support at Microsoft 

To share our recent experiences in engaging with this work we are today announcing the publication of the “Solving the TLS 1.0 Problem” whitepaper to aid customers in removing dependencies on TLS 1.0/1.1.

Cybercrime and freedom of speech – A counterproductive entanglement 

This post is authored by Gene Burrus, Assistant General Counsel. As cybercrime becomes ever more pervasive, the need for states to devote law enforcement resources to battling the problem is apparent. However, states should beware using cybercrime legislation and enforcement resources as a vehicle for restricting speech or controlling content. Doing so risks complicating essential international […]

Published
3 min read

How the Asia-Pacific region is advancing cybersecurity 

Earlier this year, my team and I had the great privilege and pleasure of spending several days in Japan, participating in the Information Technology Promotion Agency (IPA) Symposium. We also met with industry colleagues to discuss global cybersecurity trends and opportunities to engage in public policy, and met with Japanese government partners to examine the question of cloud security.

Use Enterprise Threat Detection to find “invisible” cyberattacks 

This post is authored by Roberto Bamberger, Principal Consultant, Enterprise Cybersecurity Group. Amongst the plethora of stories about cyberattacks in the news, multiple recent articles have been published describing the more difficult to detect cyberattacks which leverage normal tools already present in an enterprise to achieve their mission. SecureList calls the techniques used in these […]

Published
2 min read

4 steps to managing shadow IT 

Shadow IT is on the rise. More than 80 percent of employees report using apps that weren’t sanctioned by IT. Shadow IT includes any unapproved hardware or software, but SaaS is the primary cause in its rapid rise. Today, attempting to block it is an outdated, ineffective approach. Employees find ways around IT controls. How […]

Is social engineering the biggest threat to your organization? 

“Always remember: Amateurs hack systems. Professionals hack people.” –Bruce Schneier, CTO, Counterpane Internet Security, Inc. All over the globe, social engineering is a dominant and growing threat to organizational security. Since January 2015, the number of social engineering victims identified by the FBI has increased 270 percent, costing businesses more than $2.3 billion. Social engineering […]