Microsoft Security

Extortion Economics: Ransomware’s New Business Model

Extortion Economics: Ransomware’s New Business Model

With the right approach, cybercrime can be turned into a preventable disruption to business. There are our top tips to strengthening your posture against the ransomware economy.

Security Leaders Share 5 Steps to Strengthening Cyber Resilience

Security Leaders Share 5 Steps to Strengthening Cyber Resilience

With new threat actors emerging every day and a growing number of cyber attacks making headlines, cybersecurity has become a critical business imperative. Security leaders face the dual challenge of needing to stay competitive in...

CISOs Are Focused on These 3 Trends, Are You?

CISOs Are Focused on These 3 Trends, Are You?

Security leaders are facing growing pressures in today’s rapidly evolving cyber landscape. The rise in remote work means that many organizations are managing a complex web of in-person, online, and hybrid work scenarios while also...

5 Attack Elements Organizations Should Monitor: Anatomy of an External Attack Surface

5 Attack Elements Organizations Should Monitor: Anatomy of an External Attack Surface

How to shift your organization’s perception of comprehensive security in the face of ongoing global cyber threats.

What Every Enterprise Can Learn from Russia’s Cyber Assault on Ukraine

What Every Enterprise Can Learn from Russia’s Cyber Assault on Ukraine

Based on its observations of Russia’s cyber assault on Ukraine, Microsoft has developed these strategic steps for global organizations to take to safeguard their operations.

6 Ways to Protect Your Organization Against the Threat Group DEV-0537

6 Ways to Protect Your Organization Against the Threat Group DEV-0537

The hacking group DEV-0537, also known as LAPSUS$, operates on a global scale using a pure extortion and destruction model without deploying ransomware payloads. They recently made headlines after they breached multiple...

Load More