Free Security Assessment

Take Now

Blog

Spear-Phishers Leverage Office 365 Ecosystem to Validate Stolen Creds in Real Time

Written by Ericka Chickowski – September 11th, 2020 New attack technique uses Office 365 APIs to cross-check credentials against Azure Active Directory as victim types them in. Serving as yet another proof point of the creativity with which attackers are targeting Office 365 users with new phishing schemes, Armorblox researchers yesterday detailed a new attack technique they ...

Read More

The Newest Features Of Microsoft Teams (September 2020)

img.wp-post-image { display: inline;} With the Remote Workforce now becoming a reality for the longer term, the need to communicate with colleagues and co-workers in a virtual environment is an absolute must. There are tools out there that can be used, such as Skype, Zoom, WebEx, etc., but none of them have the ...

Read More

Microsoft Security: What cybersecurity skills do I need to become a CISO?

Written by Abbas Kudrati – Chief Security Advisor, Microsoft Build the business skills you need to advance to Chief Information Security Officer. For many cybersecurity professionals, the ultimate career goal is to land a chief information security officer (CISO) job. A CISO is an executive-level position responsible for cyber risk management and operations. But cybersecurity is transforming. ...

Read More

Where Will the Cybersecurity Industry Be Post-Pandemic?

Written by www.cybersecurity-insiders.com Many people have weighed in about the new cyberthreats emerging due to the COVID-19 pandemic. They have useful insights, but it’s also valuable to take a forward-thinking approach and ponder what the cybersecurity industry will look like once this health crisis is finally over. Here are five likely outcomes. Companies Will Increasingly ...

Read More

The Impacts of COVID-19 On Cybersecurity

There is no doubt that the Cybersecurity Threat Landscape has always been an ever changing, dynamic one.  But with the advent of COVIDC 19, this picture has changed to magnitudes that nobody has ever imagined before.  For example, the virus originally started out in the Wuhan Province of China, and theories have speculated so far ...

Read More

Pentagon Awards JEDI Cloud Contract to Microsoft for the Second Time

Written by Frank Konkel & Aaron Boyd, September 4th, 2020 The Pentagon awarded its Joint Enterprise Defense Infrastructure cloud computing contract Friday to Microsoft. The decision follows a 10-month legal battle initiated by Amazon Web Services after the Pentagon selected Microsoft in October 2019 for the contract, worth up to $10 billion over the next 10 years ...

Read More

What is PIM (Privileged Identity Management) and Why Do I Need It?

Azure Active Directory (Azure AD) is essentially an Identity Assessment Management (IAM) service that is based in the Cloud.  Through this mechanism, you can create specific user group roles for each department in your company. From there, you can then assign the appropriate levels of rights and permissions for all of the employees, so that ...

Read More

An Introduction To The SOAR Methodology

In today’s business world, there is no doubt that the IT and Network Infrastructures of all sorts of businesses are starting to become complex, even if they have a Cloud-based platform, such as that of Microsoft Azure.  The need to centralize all monitoring of log events and the collection of mission-critical information and data is ...

Read More

Federal Agencies Warn North Korean Hackers Have Upgraded Their Cash-Out Schemes

Written by Mariam Baksh – August 26th, 2020 A faction of North Korea’s General Reconnaissance Bureau associated with the methodical infiltration of financial institutions to steal money from around the world is back in action with improved capabilities, according to a technical advisory by the Cybersecurity and Infrastructure Security Agency, along with the Treasury Department, U.S. ...

Read More

New data from Microsoft shows how the pandemic is accelerating the digital transformation of cyber-security

Written by Andrew Conway General Manager, Microsoft Security - August 19th, 2020 The importance of cybersecurity in facilitating productive remote work was a significant catalyst for the two years-worth of digital transformation we observed in the first two months of the COVID-19 pandemic. In this era of ubiquitous computing, security solutions don’t just sniff out threats, ...

Read More