Tagged: Cyber

0

Deploy and Configure Azure Sentinel

The following post is part of a series of articles that will focus on the many capabilities and options of Azure Sentinel, from the beginning with deployment, through configure connectors to the setting and using...

0

Investigation and forensics Controls with M365 Security

When talking security investigation and forensics, please take the word “prevent” out of the dictionary because organizations realize that stopping complicated cyber attacks in many situations is unrealistic. Note: this post is an introduction for...

3

Windows Forensics Analysis (Evidence)

Digital information and evidence taken from a computer are used to aid in an investigation. While computer forensics was originally limited largely to online fraud and hacking, today, it serves as a powerful investigative tool...

0

Protect Endpoints with Microsoft Defender ATP

New one-click remediation capability in Microsoft365 with Microsoft Intune SecurityTasks that extend latest announced TVM feature in MDATP Microsoft Defender ATP is Microsoft security service for companies that want not just anti-malware protection but also...

0

Cyber Kill Chain

The Cyber Kill Chain framework is part of the Intelligence driven defense model for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective. There...

0

Integrating Lookout with Windows Defender ATP

Microsoft and Lookout have partnered to enable organizations to securely embrace mobile device in the security workplace. The integration combines Lookout Mobile Endpoint Security with Microsoft 365 Security (aka Office 365 & EMS & Windows)....

0

SharePoint Phishing Attack (PhishPoint)

There is a phishing attack in Office 365, the SharePoint Phishing Attack or PhishPoint. Attackers are now using Microsoft SharePoint to run phishing attacks and to target Office 365 end-user credentials and even injecting some...

error: Content is Protected !!