Quantcast
Channel: Alextv.net feed from blogs.technet.com
Browsing all 13 articles
Browse latest View live

Tracking Lateral Movement blog series by Jessica Payne

I’d like to highlight a great new series of articles that a colleague of mine in Microsoft’s new Enterprise Cybersecurity Group, Jessica Payne, has recently started publishing. Lateral movement is a...

View Article



Image may be NSFW.
Clik here to view.

Cloud security controls series: Azure Security Center

The “holy grail” of security capabilities that I’ve heard so many CISOs talk about, enables them to manage the security of the systems in their organization using a policy-based approach that provides...

View Article

Securing Privileged Access

We’ve all probably heard the old axiom that a chain is only as strong as its weakest link. In the context of cybersecurity, in many IT environments the weakest link is the workstations that...

View Article

Japan zeros in on cybersecurity

Japan is poised to take exciting steps towards improving cybersecurity in 2016. A confluence of events in 2015 catalyzed important actions from the Government of Japan action. A key wakeup call was the...

View Article

Cloud computing in government: security considerations

The last few months have seen a number of government information technology (IT) departments around the world move towards adopting cloud computing as one of the solutions deployed to delivered...

View Article


What’s Next for EU Cybersecurity after the NIS Agreement?

After three years of intense negotiations, the EU finally reached agreement on the Network and Information Security (NIS) Directive this past December. Politically, all that remains to be done is for...

View Article

The Emerging Era of Cyber Defense and Cybercrime

Cyber threats are everywhere, from hackers causing mischief to show off their skills to organized crime syndicates employing sophisticated financial ruses against governmental organizations,...

View Article

The continued importance of cybersecurity capacity building

Over the past decade, billions around the world have benefited from the exponential growth of the online environment and associated economic opportunities. The Internet has transformed from an...

View Article


Cybersecurity norms: From concept to implementation

Last year Microsoft put forward six cybersecurity norms with the aim of reducing conflict in cyberspace and protecting global trust in technology. They offer considerations for limiting nation-state...

View Article


Working to increase the cyber resilience of cities around the globe

A year ago, Microsoft and the Rockefeller Foundation announced that we will be partnering on their 100 Resilient Cities challenge, in an effort to help cities address emerging cyber resilience needs....

View Article

Headed to RSA? Here’s your event guide for trust in cloud services

RSA Conference 2016 is fast approaching. The conference agenda is packed to cover the rapidly evolving issues in information security, with trust in cloud computing at the forefront. We’ll be there to...

View Article

Progress Report: Enterprise security for our mobile-first, cloud-first world

Today Microsoft made numerous announcements about new security capabilities, products and features. These are all designed to help our customers accelerate the adoption of a more holistic security...

View Article

Anatomy of a Breach: How Hackers break in

Did you know that an attacker can be present on a network for more than 200 days before being detected? Imagine the damage that can be done to an organization during that time: Accessing sensitive data...

View Article

Browsing all 13 articles
Browse latest View live




Latest Images