5 Reasons why Microsoft should be your cybersecurity ally
When you think about cybersecurity, does Microsoft come to mind? Probably not. Here are 5 reasons why enterprises should consider partnering with Microsoft on cybersecurity.
When you think about cybersecurity, does Microsoft come to mind? Probably not. Here are 5 reasons why enterprises should consider partnering with Microsoft on cybersecurity.
This post is authored by Steven Meyers, security operations principal, Microsoft Cyber Defense Operations Center. Introducing a new video on best practices from the Microsoft Cyber Defense Operations Center In 2016, 4.2+ billion records were stolen by hackers. The number of cyberattacks and breaches in 2017 have risen 30 percent.
This post is authored by Simon Pope, Principal Security Group Manager, Microsoft Security Response Center. Introducing new video on best practices from the Microsoft Cyber Defense Operations Center Ask any CISO or cybersecurity professional about their greatest security challenge, and it’s a good chance the answer will be “the actions of our people.
This post is authored by Roberto Bamberger, Principal Consultant, Enterprise Cybersecurity Group. Amongst the plethora of stories about cyberattacks in the news, multiple recent articles have been published describing the more difficult to detect cyberattacks which leverage normal tools already present in an enterprise to achieve their mission.
Shadow IT is on the rise. More than 80 percent of employees report using apps that weren’t sanctioned by IT. Shadow IT includes any unapproved hardware or software, but SaaS is the primary cause in its rapid rise. Today, attempting to block it is an outdated, ineffective approach. Employees find ways around IT controls.
I was in the midst of composing this blog on diversity in cybersecurity when a Fortune article on Women in Cybersecurity found its way to my LinkedIn feed. It was promoted to me by a man I know and respect.
This post is authored by a Security Principal of Cyber Security Services and Engineering Each week seems to bring a new disclosure of a cybersecurity breach somewhere in the world. In 2016 alone, over 3 billion customer data records were breached in several high-profile attacks globally.
As companies embrace the cloud and mobile computing to connect with their customers and optimize their operations, they take on new risks. Traditional IT boundaries have disappeared, and adversaries have many new attack vectors.
This post was authored by Ann Johnson, Vice-President, Enterprise Cybersecurity Group Headlines highlighting how vulnerable we are to cyber threats are now all too commonplace. The statistics on security events and successful network breaches continue a trend that favors attackers.
The rapid pace of technological evolution and dramatic increases in connectivity are sparking discussion about what systemic cyber risks what might look like and how best manage them.