Security

LATEST

Security

How to Install and Configure Microsoft LAPS

Last Update: Nov 14, 2022

Configure Microsoft’s new Local Administrator Password Solution (LAPS) tool to protected local administrator accounts.

View Article
Network Security

What is a Software-Defined Perimeter?

A software-defined perimeter (SDP) is a modern network security framework for creating a virtual network perimeter to protect an organizational infrastructure from outsiders. In this article, I’ll explain how a software-defined perimeter works and what are the main use cases for this new computer security approach. With increasingly complex network and application security requirements, a…

View Article
Cloud Computing

Microsoft Defender for Endpoint Adds Network Protection on iOS and Android

Microsoft has announced that mobile network protection is now generally available in Defender for Endpoint. The feature first launched in public preview back in July to help organizations protect iOS and Android devices against Wi-Fi-related threats in enterprise networks. “As the world continues to make sense of the digital transformation, networks are becoming increasingly complex…

View Article

Choosing between Virtual Private Network and Zero Trust Remote Access Solutions

Last Update: Nov 11, 2022

As we enter a time of crisis that will see a significant number of employees asked to work from home, organizations need to provide effective but secure remote access to corporate resources. The tried and tested virtual private network (VPN) might seem like the obvious choice. But so called ‘zero trust’ is gaining popularity and could surpass traditional VPN access.

View Article
Security

Microsoft Defender for Business Adds Server Protections for SMBs

Microsoft launched a preview of new server protection capabilities in its Defender for Business solution back in July. The company announced this week that this feature is now generally available to help small businesses protect Windows and Linux servers. Microsoft Defender for Business is an endpoint security solution for small and medium-sized businesses (SMBs) with…

View Article
Security

Why You Need to Create an Incident Response Plan

To effectively handle various types of security break-ins, many organizations have created an incident response (IR) plan. In this article, I’ll explain what is an incident response plan, how it differs from a disaster recovery plan, and what steps you need to follow to create an effective IR plan for your organization. While most businesses…

View Article
Security

Microsoft Defender Vulnerability Management Now Detects OpenSSL 3.0 Vulnerabilities

Last week, the OpenSSL team patched two high-severity security vulnerabilities in its open-source cryptography tool. Microsoft announced yesterday that organizations can use Defender Vulnerability Management to detect vulnerable devices in their organization and monitor their patching process to reduce security threats. OpenSSL is a popular cryptography library that provides open-source implementations of both SSL and…

View Article
Security

Microsoft Warns Attackers Now Leveraging Raspberry Robin to Distribute Clop Ransomware

Microsoft has warned users that threat actors have deployed a Clop encryption malware to encrypt enterprise networks affected by the Raspberry Robin worm. The company detailed in a security advisory that the payload had infected around 3,000 devices in 1,000 organizations in the last month. Security firm Red Canary first discovered the Raspberry Robin worm…

View Article
Security

Microsoft 365 Defender Introduces New Identity Protection Alerts

Microsoft has introduced a new Azure Active Directory Identity Protection alerts feature in Microsoft 365 Defender. The feature is designed to help organizations prevent threat actors from gaining unauthorized access to enterprise networks via compromised accounts. With this release, IT admins can now configure policies to trigger Identity Protection alerts when one or more user…

View Article
Security

Microsoft Authenticator Gets Number Matching and Additional Context Support

Microsoft has announced the general availability of several new security capabilities in its Microsoft Authenticator app. The first new feature that the company highlighted today is number matching support, which prompts users to enter a number displayed on the sign-in screen to verify their identities. Last month, Microsoft warned about the rise in MFA fatigue…

View Article
Go to page