Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them

Every year billions of new connected devices come online. These devices enable businesses to finetune operations, optimize processes, and develop analytics-based services.
The post Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them appeared first on Microsoft Security. READ MORE HERE…

Read more

Lessons learned from the Microsoft SOC—Part 3d: Zen and the art of threat hunting

This blog provides lessons learned on how Microsoft hunts for threats in our IT environment and how you can apply these lessons to building or improving your threat hunting program. This is the seventh in a series.
The post Lessons learned from the Microsoft SOC—Part 3d: Zen and the art of threat hunting appeared first on Microsoft Security. READ MORE HERE…

Read more

Protecting your organization against password spray attacks

If your users sign in with guessable passwords, you may be at risk of a password spray attack.
The post Protecting your organization against password spray attacks appeared first on Microsoft Security. READ MORE HERE…

Read more