What we like about Microsoft Defender for Endpoint
Microsoft Defender for Endpoint provides the right security intelligence for Expel to analyze rich data and provide support for their customers.
Microsoft Defender for Endpoint provides the right security intelligence for Expel to analyze rich data and provide support for their customers.
A year ago, we reported the steady increase in the use of web shells in attacks worldwide. The latest Microsoft 365 Defender data shows that this trend not only continued, it accelerated. Read our investigation into the escalating prevalence of web shells.
IT and security teams have been searching for a solution to accommodate BYOD that won’t compromise network security.
This blog is a guide for security administrators using Microsoft 365 Defender and Azure Defender to identify and implement security configuration and posture improvements that harden enterprise environments against Solorigate’s attack patterns.
We, along with the security industry and our partners, continue to investigate the extent of the Solorigate attack. While investigations are underway, we want to provide the defender community with intel to understand the scope and impact, remediation guidance, and detections and protections we have built as a result.
Endpoint detection and response (EDR) in block mode in Microsoft Defender for Endpoint turns EDR detections into real-time blocking of threats. Learn how it stopped an IcedID attack.
Cybercriminals have ramped up their initial compromises through phishing and pharming attacks using a variety of tools and tactics that, while numerous, are simple and can often go undetected.
Simplifying security, compliance, and identity: Announcing Microsoft Defender, enhancements to Data Loss Prevention, and decentralized identity pilots
Corrata’s Microsoft Cloud App Security integration addresses risk mitigation through endpoint-based discovery and control for cloud apps.
Gartner has listed Microsoft as a Leader in its 2020 Magic Quadrant for Unified Endpoint Management.
Exchange servers are high-value targets. These attacks also tend to be advanced threats with highly evasive, fileless techniques. Keeping these servers safe from these advanced attacks is of utmost importance.
CISO Stressbusters: CISO guidance and support from around the world.