Cloud security controls series: Encrypting Data in Transit

Whether organizations store and process data on-premise, in the cloud, or use a combination of both, it is important that they protect that data when it is transmitted across networks to information workers, partners and customers. For example, when an administrator is using the Microsoft Azure Portal to manage the service for their organization. The data transmitted between the device the administrator is using and the Azure Portal needs to … Read more »

Cloud security controls series: Azure AD Privileged Identity Management

Securely managing access to privileged accounts has been a challenge for many of the CISOs I talk to. Many of these CISOs worry that their organizations have too many permanent accounts with high levels of privilege in their environments. Some examples of the threats that keep these people up at night include malicious or rogue administrators, administrator credentials leaked via phishing attacks, administrator credentials cached on compromised systems, user accounts … Read more »

Cloud security controls series: Multi-factor Authentication

Recently I wrote an article on the risk of leaked credentials in which I discussed how credentials are stolen in bulk directly from organizations’ websites. As illustrated in Figure 1, during the eight months between November 2013 and June 2014, Microsoft tracked about 1,700 distinct website credential thefts, comprising a little more than 2.3 million credentials that were posted in public places on the Internet. This number represents only a … Read more »

Cloud security controls series: Azure Active Directory‘s Access and Usage Reports

Over the past several months I have had many, many conversations with business customers and governments about the security benefits of Microsoft’s Cloud service offerings. This video from the RSA Conference earlier this year will give you an idea of the types of topics we have been discussing with customers. These conversations have increasingly become less about whether the Cloud can be trusted, and more about the innovative security and … Read more »

The Latest Picture of the Threat Landscape in the European Union – part 3

In part 1 of this series on the threat landscape in the European Union (EU) I discussed the encounter rates (ER) and infection rates (CCM) among EU countries/regions, diving a little deeper into the locations with the highest malware encounter rates and infection rates. In part 2 I discussed the locations in the EU with the lowest ERs and CCMs, as well as the top threats found in the region … Read more »

The Latest Picture of the Threat Landscape in the European Union – part 2

In part 1 of this series on the threat landscape in the European Union (EU) I examined the encounter and infection rates among EU member countries/regions, focusing on a couple of the locations with highest malware encounter rates (ER) and infection rates (CCM). In part 2 of the series I’ll focus on the locations in the EU with the lowest ERs and CCMs, I’ll also examine the top threats found … Read more »

Governments recognize the importance of TPM 2.0 through ISO adoption

Earlier today, the Trusted Computing Group (TCG) announced in a press release the Trusted Platform Module (TPM) 2.0 Library Specification was approved by the ISO/IEC Joint Technical Committee (JTC) 1 and will be available later in the year as ISO/IEC 11889:2015. This landmark accomplishment is set to encourage worldwide adoption of the TPM 2.0, which is critical for improving trust in information technology products and services. TPM 2.0 builds on … Read more »

The Latest Picture of the Threat Landscape in the European Union – part 1

I had the opportunity to visit with some European based customers when I spoke at the RSA Unplugged conference in London just a few weeks ago. Many of the customers I met with were very interested in a deep dive into the types of threats we see in the region. I have written about the threat landscape in Europe and European Union (EU) extensively over the years, including the articles … Read more »

The Risk of Leaked Credentials and How Microsoft’s Cloud Helps Protect Your Organization

This week the Microsoft Identity and Security Services Division announced another new security report feature is now in preview that helps protect Azure Active Directory Premium customers from the risk associated with leaked credentials. The Risk of Leaked Account Credentials One scenario that has unfortunately become all too common is where account credentials are stolen in bulk by criminals through website breaches. Credentials are also unwittingly provided directly by the … Read more »

Latest data shows newer versions of Windows have lower malware infection rates than older versions

We released the latest volume of the Microsoft Security Intelligence Report last week. The latest data on how different versions of the Windows operating system are mitigating modern malware attacks suggests that newer versions are performing better than older versions. The figure below illustrates the malware infection rates for Windows client and server operating systems in the third and fourth quarters of 2014 based on data from hundreds of millions … Read more »