Blog

How To Create A Playbook In Azure Sentinel – Part 2

In our last article, we examined the concept of what a Playbook is, and how to create one specifically for the Azure Sentinel platform.  Specifically, the following topics were covered; Creating the Playbook; Establishing The Trigger Point. In this article, we continue with theme of creating the Playbook, but looking at more advanced functionalities. How To Steps ...

Read More

How To Create A Playbook In Azure Sentinel

As we know, many IT Security teams across Corporate America are totally overburdened with the many alerts and warnings that they receive from their network security tools. CISOs are realizing this and are taking more steps to help alleviate the phenomenon which is known as “Alert Fatigue”. For example, they are strategically placing technologies in ...

Read More

Forrester names Microsoft a Leader in the 2021 Enterprise Email Security Wave

Microsoft has been positioned as a leader in The Forrester Wave™: Enterprise Email Security, Q2 2021, receiving among the highest scores in the strategy category. The Forrester Wave report evaluates enterprise email security solutions and provides a detailed overview of the current offering, strategy, and market presence of these vendors. From the report, “Forrester’s 2021 ...

Read More

How To Prevent Data Loss With Azure

One of the hottest topics today in the world of Cybersecurity is that of Data Loss. To some degree or another, most companies have experienced this one way or another, whether it was intentional or not. But given that many employees are using their personal devices to do their daily job tasks, this has dramatically ...

Read More

Army moves Microsoft HoloLens-based headset from prototyping to production phase

Alex Kipman - Microsoft Technical Fellow Earlier today, the United States Army announced that it will work with Microsoft on the production phase of the Integrated Visual Augmentation System (IVAS) program as it moves from rapid prototyping to production and rapid fielding. The IVAS headset, based on HoloLens and augmented by Microsoft Azure cloud services, delivers a ...

Read More

Valentine’s Day Phishing Heartbreaks

It is time to remind your users that heartless con artists use social engineering tactics to trick people looking for love.  The FBI's Internet Crime Complaint Center warns every year that scammers use poetry, flowers, and other gifts to reel in victims, the entire time declaring their "undying love." These callous criminals -- who also troll ...

Read More

What Do Email Phishing Scams Do? Best Practices for Protecting Your Information

Email Phishing scams are carried out online by tech-savvy con artists and identity theft criminals. They use spam, fake websites constructed to look identical to real sites, email and instant messages to trick you into divulging sensitive information, like bank account passwords and credit card numbers. Once you take the phisher's bait, they can use ...

Read More

How to Recover from A Phishing Attack – Part 1

Introduction Our last series of blogs closely examined the details of a Spear Phishing Attack. But whoever or whatever the target is, once the damage is done, efforts need to be taken to mitigate the damage, and try to find ways so that these types of attacks don’t happen again. In this series of blogs, we examine ...

Read More

How to Recover from A Phishing Attack – Part 2

Introduction Our last blog examined the steps that you need to take in order to recover from a Phishing attack. In this one, we can continue with that theme. The Steps Remediation: This is deemed to be one of the most critical phases; as this is where the damage of the Phishing attack will be contained. This ...

Read More

An Introduction to Spear Phishing – Part 1

Introduction to Spear Phishing As we know it today, Phishing has become one of the most commonly used tactics by the Cyber attacker in order to garner personal information and data.  This primarily involves our physical addresses, E-Mail addresses, credit card numbers, banking and other types and kinds of financial information, Social Security numbers, etc. Phishing involves ...

Read More