#cloud security

    2022-08-02

    Confidential data is one of the most important assets of any organization. Effective workplace and advanced information security prevent you from additional cost, reputational damage, and other expens…

    2022-07-21

    Modern businesses face greater cybersecurity risks and complexity of security challenges than ever before. As attacks have become more sophisticated and regular, alerts increase, and security teams ar…

    2022-06-24

    Cyber-attacks have become the new daily reality for organizations now that most of them have shifted to a hybrid working model. Cyber-attacks can cause major damage to businesses and their IT infrastr…

    2022-05-10

    During the past few years, our traditional workplace has irrevocably changed to more flexible hybrid working environment, with organizations having been forced to adapt to the modern business approach…

    2022-02-02

    Microsoft 365 is a complete solution for businesses that brings together Office 365, Windows 10, and Enterprise Mobility + Security (EMS). Securing Microsoft 365 has become crucial, especially as rate…

    2020-10-27

    Azure Security Center is designed to strengthen the security posture of your data centers. It provides advanced threat protection across your hybrid workloads in the cloud and examines whether your re…

    2020-06-03

    Microsoft Defender ATP is a security that keeps endpoints safe from cyber threats, identifies sophisticated attacks, and automates security incidents. It is built into Windows 10, not bolted on, so th…

    2020-02-05

    Microsoft 365 Security is smart. It’s constantly learning. New capabilities are being added. The user experience is evolving. These facts make creating a perfectly consistent CIE experience challengin…

    2020-01-21

    Microsoft Threat Protection offers brand-new threat information in real time, viewed in an updated UI. It is very crucial for the Security Team to access threat information immediately, as well as ide…

    2019-11-12

    Phishing has been around for nearly as long as email has. More than 90% of organizations report being hit by targeted email attacks, with 23% suffering financial damage that can average $1.6 million a…

    2019-11-01

    One of the most common security support requests from our customers is for assistance with remediating an account compromise. The most common scenario is that a member of their organization became the…

    2019-10-28

    Protection of confidential data gets more challenging every day, as it is widely used via various devices and apps. Microsoft Information Protection allows companies to keep confidential data safe and…

    2019-10-07

    If you have a Microsoft 365 subscription, Outlook now includes encryption features that let you share your confidential and personal information while ensuring that your email message stays encrypted …

    2019-09-05

    Interpreting compliance requirements is complicated, and they can also be labor-intensive to implement. With new regulations and changes coming constantly, keeping up can be difficult and expensive. C…

    2019-06-27

    Microsoft released the May 2019 update of security requirements for desktop and server systems, in which regular periodic password changes no longer appear.

    2019-06-06

    In the middle of May 2019, a compliance and security conference took place and, in case you missed it, we’ve prepared the recap of some sessions for you. One of the presentations was hosted by Silvia …

    2019-06-04

    Before we jump into the cloud app security implementation or the management process, let's talk about the cloud app security; what it is, and why we need it. It’s a Microsoft cloud-based solution that…

    2019-05-29

    Previously, we discussed the subject of zero-trust network security, but at the Security and Compliance Virtual Conference that took place recently, experts talked a lot about zero-trust architecture …

    2019-05-01

    With these capabilities, users can easily apply sensitivity labels to documents and emails based on the labels defined by your organization. The experience is built directly into Office apps, with no …

    2019-04-29

    Perimeter-based networks protected by a firewall are familiar to anyone because they were so common. But the key word is “were,” because they are outdated now. They function assuming that machines and…

    2019-02-28

    In day-to-day life, company compliance is a necessary evil. According to research, there are more than 200 updates from 750 regulatory bodies every day – a huge burden for employees to stay up-to-date…

    2019-01-10

    In the previous article, we discussed the best practices that will enhance the cybersecurity of your Microsoft 365 Business. This time, let’s discover what Microsoft 365 has to offer in terms of secu…

    2019-01-10

    Online security is given a lot of attention lately, with high-profile hacks and cyberattacks all over the world. Big enterprises are spending more than ever to guarantee reasonable cybersecurity, sinc…

    2018-12-04

    We are excited to start a series of scenarios on how to improve your Microsoft 365 security and productivity, prepared by Microsoft engineers. The first one is about how to detect attacks before they …

    2018-11-30

    Below you will see a list of security-related links.

    2018-06-22

    Recently, Avanan (cloud security provider) has been seeing a number of phishing attacks using a simple strategy to get their blatant email spoofs past Microsoft's phishing scans. The tactic, which the…

    2018-05-29

    Extraordinary engineer and now CTO of Microsoft Azure, Mark Russinovich talks about Azure's data centers at Build 2018.

    2018-04-23

    Microsoft is excited to announce the general availability of the Azure DDoS Protection Standard service in all public cloud regions. This service is integrated with Azure Virtual Networks and provides…