May 24, 2022

Anatomy of a DDoS amplification attack

Amplification attacks are one of the most common distributed denial of service (DDoS) attack vectors. These attacks are typically categorized as flooding or volumetric attacks, where […]
May 24, 2022

How to improve risk management using Zero Trust architecture

“Compliance is all about risk management and lessening risk, and the same is true of Zero Trust.” —Abbas Kudrati What’s risk management and why is it […]
May 24, 2022

Beneath the surface: Uncovering the shift in web skimming

Microsoft security researchers recently observed that web skimming campaigns now employ various obfuscation techniques to deliver and hide skimming scripts. It’s a shift from earlier tactics […]
May 20, 2022

Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices

In the last six months, we observed a 254% increase in activity from a Linux trojan called XorDdos. First discovered in 2014 by the research group […]
May 19, 2022

So you want to be a CISO: What you should know about data protection

Data is the lifeblood of any organization. Whether you’re a Chief Information Security Officer (CISO) or aspiring to become one, protecting sensitive business data will be […]
May 18, 2022

Easy authentication and authorization in Azure Active Directory with No-Code Datawiza

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. The acceleration of cloud journeys fueled by the […]
May 17, 2022

Microsoft showcases the future of comprehensive security at RSA 2022

The last time the RSA Conference was held as an in-person event was in 2020. Needless to say, a lot has changed since then. RSA is […]
May 13, 2022

SC-100: Microsoft Cybersecurity Architect Gets a Learning Path

For those of us that took the SC-100 beta exam, there’s a strong indicator today that the exam results could show up soon. That indicator is […]
May 13, 2022

Small business: the opportunity for business transformation

Successful small business owners are likely to agree on one thing: you cannot do it alone. Running a business with tighter margins and fewer staff than […]
May 12, 2022

Prepare for security certification in an evolving industry

As notable cybersecurity breaches occur more frequently, demand for tech professionals with comprehensive security training remains high. To help address this demand for qualified workers, Microsoft […]
May 11, 2022

Gain the tools to tackle customer security challenges at Days of the Defenders

Prioritizing online security continues to be critical for everyone who touches and manages online and cloud-based information. Many have a story about a company or customer […]
May 11, 2022

Microsoft security experts outline next steps after compromise recovery

Who is CRSP? The Microsoft Compromise Recovery Security Practice (CRSP) is a worldwide team of cybersecurity experts operating in most countries, across both public and private […]