Rethinking cyber scenarios—learning (and training) as you defend

Gamified cybersecurity learning is an increasingly important must-have in your SecOps program, from understanding basic concepts all the way into advanced attacker and defense scenarios. Microsoft and Circadence are working together to democratize and scale cyber readiness globally.
The post Rethinking cyber scenarios—learning (and training) as you defend appeared first on Microsoft Security. READ MORE HERE…

Read more

CISO series: Lessons learned from the Microsoft SOC—Part 3b: A day in the life

In this next post in our series, we provide insight into a day in the life of our SOC analysts investigating common front door attacks.
The post CISO series: Lessons learned from the Microsoft SOC—Part 3b: A day in the life appeared first on Microsoft Security. READ MORE HERE…

Read more

Spear phishing campaigns—they’re sharper than you think

Spear phishing campaigns can be highly effective—but they aren’t foolproof. If you understand how they work, you can put measures in place to reduce their power.
The post Spear phishing campaigns—they’re sharper than you think appeared first on Microsoft Security. READ MORE HERE…

Read more

Rethinking cyber learning—consider gamification

Gamified cybersecurity solutions offer immense promise by giving users practical, hands-on opportunities to learn by doing. Microsoft and Circadence are partnering to deliver Azure-hosted cyber range learning solutions for beginners up to advanced SecOps pros. Gamification is an increasingly important way for enterprises to attract tomorrow’s cyber pro talent and create tailored learning and more defined career paths and progression.
The post Rethinking cyber learning—consider gamification appeared first on Microsoft Security. READ MORE HERE…

Read more

Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model

Digital transformation has made the traditional perimeter-based network defense obsolete. A new white paper helps you understand the core principles of a Zero Trust approach.
The post Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model appeared first on Microsoft Security. READ MORE HERE…

Read more