Skip to content

Microsoft Secure

Microsoft Data Center in Quincy

Advanced Threat Analytics security research network technical analysis: NotPetya

This post is authored by Igal Gofman, Security Researcher, Advanced Threat Analytics.  On June 27, 2017 reports on a new variant of Petya (which was later referred to as NotPetya) malware infection began spreading across the globe. It seems the malware’s initial infection delivered via the “M.E.doc” update service, a Ukrainian finance application. Based on...

Read more

MS Ignite Venue

Stepping up protection with intelligent security

With digital transformation, technology becomes increasingly central to every business and organization. This makes ensuring cybersecurity increasingly important. And, as employees increase their use of mobile devices and cloud-based apps, protecting their work requires a new approach for IT. With 80% of employees admitting to the use of non-approved cloud apps for work, ensuring data...

Read more

Global,Abstract geometric shape with spherical severed,Global communication

Microsoft’s perspective on cyber resilience

In the wake of recent ransomware outbreaks, I wanted to understand how impacted firms have evolved their thinking on cyber resilience planning and implementation. I asked the Detection and Response Team at Microsoft, who help our customers proactively and in real time to respond and recover from cyberattacks, to share their experiences....

Read more

Tips for protecting your information and privacy against cybersecurity threats

Tips for protecting your information and privacy against cybersecurity threats

This post is authored by Steven Meyers, security operations principal, Microsoft Cyber Defense Operations Center. Introducing a new video on best practices from the Microsoft Cyber Defense Operations Center In 2016, 4.2+ billion records were stolen by hackers. The number of cyberattacks and breaches in 2017 have risen 30 percent. The business sector leads in...

Read more

The CISO Perspective: Putting lessons from WannaCrypt into practice to avoid future threats

Last month, customers and companies around the world were impacted by the WannaCrypt ransomware attack. Even those not impacted are assessing their risk and taking steps to help prevent such attacks. For everyone, including Microsoft, the attack is a stark reminder of the need for continued focus on security and proven operational techniques. So, after...

Read more

Use Enterprise Threat Detection to find “invisible” cyberattacks

This post is authored by Roberto Bamberger, Principal Consultant, Enterprise Cybersecurity Group. Amongst the plethora of stories about cyberattacks in the news, multiple recent articles have been published describing the more difficult to detect cyberattacks which leverage normal tools already present in an enterprise to achieve their mission. SecureList calls the techniques used in these...

Read more