Microsoft Security Intelligence Report Volume 22 is now available
The latest volume of the Microsoft Security Intelligence Report is now available for free download at www.microsoft.com/sir.
The latest volume of the Microsoft Security Intelligence Report is now available for free download at www.microsoft.com/sir.
Microsoft has concluded that the Chinese Certificate Authorities (CAs) WoSign and StartCom have failed to maintain the standards required by our Trusted Root Program. Observed unacceptable security practices include back-dating SHA-1 certificates, mis-issuances of certificates, accidental certificate revocation, duplicate certificate serial numbers, and multiple CAB Forum Baseline Requirements (BR) violations.
Modern social engineering attacks use non-portable executable (PE) files like malicious scripts and macro-laced documents. Every month, Windows Defender AV detects non-PE threats on over 10 million machines. Learn how machine learning drives next-gen protection capabilities and cloud-based, real-time blocking of new and unknown threats: Machine learning vs.
This post is authored by Jonathan Trull, Worldwide Executive Cybersecurity Advisor, Enterprise Cybersecurity Group. And by Vidhi Agarwal, Senior Security Program Manager, Microsoft Security Response Center (MSRC). Within the information security community, one of the emerging areas of focus and investment is the concept of security automation and orchestration.
Microsoft has been investing heavily in next-generation security technologies. These technologies use our ability to consolidate large sets of data and build intelligent systems that learn from that data.
When you think about cybersecurity, does Microsoft come to mind? Probably not. Here are 5 reasons why enterprises should consider partnering with Microsoft on cybersecurity.