Blog

Microsoft Security: What cybersecurity skills do I need to become a CISO?

Written by Abbas Kudrati – Chief Security Advisor, Microsoft Build the business skills you need to advance to Chief Information Security Officer. For many cybersecurity professionals, the ultimate career goal is to land a chief information security officer (CISO) job. A CISO is an executive-level position responsible for cyber risk management and operations. But cybersecurity is transforming. ...

Read More

Where Will the Cybersecurity Industry Be Post-Pandemic?

Written by www.cybersecurity-insiders.com Many people have weighed in about the new cyberthreats emerging due to the COVID-19 pandemic. They have useful insights, but it’s also valuable to take a forward-thinking approach and ponder what the cybersecurity industry will look like once this health crisis is finally over. Here are five likely outcomes. Companies Will Increasingly ...

Read More

The Impacts of COVID-19 On Cybersecurity

There is no doubt that the Cybersecurity Threat Landscape has always been an ever changing, dynamic one.  But with the advent of COVIDC 19, this picture has changed to magnitudes that nobody has ever imagined before.  For example, the virus originally started out in the Wuhan Province of China, and theories have speculated so far ...

Read More

Pentagon Awards JEDI Cloud Contract to Microsoft for the Second Time

Written by Frank Konkel & Aaron Boyd, September 4th, 2020 The Pentagon awarded its Joint Enterprise Defense Infrastructure cloud computing contract Friday to Microsoft. The decision follows a 10-month legal battle initiated by Amazon Web Services after the Pentagon selected Microsoft in October 2019 for the contract, worth up to $10 billion over the next 10 years ...

Read More

What is PIM (Privileged Identity Management) and Why Do I Need It?

Azure Active Directory (Azure AD) is essentially an Identity Assessment Management (IAM) service that is based in the Cloud.  Through this mechanism, you can create specific user group roles for each department in your company. From there, you can then assign the appropriate levels of rights and permissions for all of the employees, so that ...

Read More

An Introduction To The SOAR Methodology

In today’s business world, there is no doubt that the IT and Network Infrastructures of all sorts of businesses are starting to become complex, even if they have a Cloud-based platform, such as that of Microsoft Azure.  The need to centralize all monitoring of log events and the collection of mission-critical information and data is ...

Read More

Federal Agencies Warn North Korean Hackers Have Upgraded Their Cash-Out Schemes

Written by Mariam Baksh – August 26th, 2020 A faction of North Korea’s General Reconnaissance Bureau associated with the methodical infiltration of financial institutions to steal money from around the world is back in action with improved capabilities, according to a technical advisory by the Cybersecurity and Infrastructure Security Agency, along with the Treasury Department, U.S. ...

Read More

New data from Microsoft shows how the pandemic is accelerating the digital transformation of cyber-security

Written by Andrew Conway General Manager, Microsoft Security - August 19th, 2020 The importance of cybersecurity in facilitating productive remote work was a significant catalyst for the two years-worth of digital transformation we observed in the first two months of the COVID-19 pandemic. In this era of ubiquitous computing, security solutions don’t just sniff out threats, ...

Read More

Microsoft’s AI for Health supports COVID-19 vaccine development

Given the global urgency of the COVID-19 pandemic, Microsoft's AI for Health program has stepped in to support the development and potential deployment of Vaxine's COVAX-19 vaccine with a philanthropic grant. Vaxine Pty Ltd, a biotechnology company based in South Australia, uses computational and artificial intelligence (AI)-based technologies to accelerate pandemic vaccine and drug development with ...

Read More

Cyber Readiness Checklist

Want to read the rest of the checklist? Go to www.kamind.com/ares-checklist-form to continue reading.  

Read More