HackDig : Dig high-quality web security articles

How Microsoft can help you go passwordless this World Password Day

It’s that time of year again. World Password Day is May 4, 2023.1 There’s a reason it’s still going strong 10 years after being created by cybersecurity professionals. A recent study that analyzed more than 15 billion passwords found that the top 10 most popular passwords still include easy-to-crack combinations like “123456” and “qwerty.”2 With that level o
Publish At:2023-05-04 09:18 | Read:160761 | Comments:0 | Tags:Cybersecurity Identity and access management Identity and ac

LinkedIn and Microsoft Entra introduce a new way to verify your workplace

In the digital world, when you meet professional contacts for the first time online, you need additional trust signals to increase your confidence that they are who they say they are. We’re thrilled to announce that millions of LinkedIn members will be able to verify their place of work with a Microsoft Entra Verified ID credential. By simply looking for a V
Publish At:2023-04-12 09:17 | Read:173834 | Comments:0 | Tags:Cybersecurity Identity and access management Identity and ac

Secure hybrid and remote workplaces with a Zero Trust approach

Productivity and innovation have become critical goals in many hybrid and remote work environments. Ensuring preventative and strong security, in turn, must be at the heart of that. In this blog series, we’ll discuss two Zero Trust business scenarios: enabling a more productive hybrid or remote work environment and rapidly modernizing your organization’s sec
Publish At:2023-04-06 13:15 | Read:189836 | Comments:0 | Tags:Cybersecurity Identity and access management Zero Trust Iden

Gain real-time identity protection with Microsoft and Recorded Future

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.  You’ve implemented multifactor authentication for access to your enterprise network. But what if multifactor authentication isn’t as foolproof as you’re hoping? Are you comfortable betting your organization’s security on it
Publish At:2023-03-21 13:30 | Read:140642 | Comments:0 | Tags:Cybersecurity Identity and access management Microsoft Intel

Join us at Microsoft Secure to discover the latest security solutions

Microsoft Secure is our first flagship event designed just for security professionals. On March 28, 2023, we will bring together security professionals from around the world to explore security information and event management (SIEM) and extended detection and response (XDR), threat intelligence, AI, data security, multicloud security, and more. In this one-
Publish At:2023-03-16 12:22 | Read:396408 | Comments:0 | Tags:AI and machine learning Cybersecurity Data Protection Identi

Get integrated Microsoft Purview Information Protection in Adobe Acrobat—now available

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.  Data security and compliance are a top priority for leaders as cyberattacks are on the rise. In fact, attacks have increased by 32 percent in the past year, and 1 in 40 organizations has fallen victim to ransomware.1 To protec
Publish At:2023-03-07 16:56 | Read:340084 | Comments:0 | Tags:Azure Security Compliance Cybersecurity Identity and access

Cybersecurity health and how to stay ahead of attackers with Linda Grasso

The security community is continuously changing, growing, and learning from each other to better position the world against cyberthreats. In the latest post of our Community Voices blog series, Microsoft Security Senior Product Marketing Manager Brooke Lynn Weenig talks with Linda Grasso, the f
Publish At:2023-02-16 13:42 | Read:234518 | Comments:0 | Tags:Cybersecurity Identity and access management Voice of the Co

2023 identity security trends and solutions from Microsoft

Welcome to 2023! I wanted to kick this year off by having a quick look at the trends in identity security, what you can do about it, and what Microsoft is doing to help you. One of the things we talk about on the team is “shiny object syndrome”—there are a ton of innovative and scary attacks and research out there. Unfortunately, each one tends to pull us in
Publish At:2023-01-26 17:39 | Read:240727 | Comments:0 | Tags:Cybersecurity Identity and access management Identity and ac

​​Microsoft Entra: 5 identity priorities for 2023

Welcome to 2023. After the pandemic upended how we work, learn, play, and manage our lives, we find ourselves more connected than ever, with more convenient access to an ever-wider range of online tools and experiences. But as our global digital footprint continues to grow, so does the risk of cyberthreats. And now, economic uncertainty is challenging the
Publish At:2023-01-09 13:41 | Read:242694 | Comments:0 | Tags:Cybersecurity Identity and access management Identity and ac

How to build a secure foundation for identity and access

The security community is continuously changing, growing, and learning from each other to better position the world against cyberthreats. In the latest post of our Community Voices blog series, Microsoft Security Senior Product Marketing Manager Brooke Lynn Weenig talks with Christina Richmond, a cybersecurity exp
Publish At:2022-12-19 17:38 | Read:234258 | Comments:0 | Tags:Cybersecurity Identity and access management Voice of the Co

Implementing Zero Trust access to business data on BYOD with Trustd MTD and Microsoft Entra

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.  As more employees work remotely on a variety of devices and networks, businesses need a security model that supports this new operational efficiency. An expanding perimeter poses challenges for organizational security, exposin
Publish At:2022-11-30 13:40 | Read:274599 | Comments:0 | Tags:Cybersecurity Identity and access management Microsoft Intel

Token tactics: How to prevent, detect, and respond to cloud token theft

As organizations increase their coverage of multifactor authentication (MFA), threat actors have begun to move to more sophisticated techniques to allow them to compromise corporate resources without needing to satisfy MFA. Recently, the Microsoft Detection and Response Team (DART) has seen an increase in attackers utilizing token theft for this purpose. By
Publish At:2022-11-29 17:37 | Read:266686 | Comments:0 | Tags:Cybersecurity Identity and access management Incident respon

The Role of IAM in Maintaining Cloud Security

Cloud computing is an effective solution for large and small companies across every industry. There has been rapid adoption due in large part to its accessibility, flexibility, and reliability. The cloud environment brings a significant amount of benefits, but at the same time, it can expose businesses to various alarming cybersecurity risks.A study conducte
Publish At:2022-06-29 01:05 | Read:693825 | Comments:0 | Tags:Cloud Featured Articles cloud security IAM identity and acce

Building a More Secure Cloud: 5 Strategies for 2022

Cloud adoption continues to soar. More than two-thirds of small to mid-sized businesses intend to increase their use of cloud technologies over the next few years. While the cloud comes with many security benefits, it also carries unique concerns.As the cloud becomes increasingly central to business operations, cloud security should be a priority. Businesses
Publish At:2022-06-01 02:13 | Read:745916 | Comments:0 | Tags:Cloud Featured Articles Automation cloud security cloud stra

Denonia cryptominer is first malware to target AWS Lambda

p>Security researchers at Cado Security, a cybersecurity forensics company, recently discovered the first publicly-known malware targeting Lambda, the serverless computing platform of Amazon Web Services (AWS). Though Lambda has been around for less than ten years, serverless technology is considered relatively young, according to Matt Muir, one of Cado&#
Publish At:2022-04-11 12:48 | Read:1010975 | Comments:0 | Tags:Business AWS IAM AWS Lambda C2 Cado Security command & contr

Announce

Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud