Martijn Lammerts
My own digital place with a little of everything

Windows Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices

This integration empowers Windows to natively understand Azure Information Protection sensitivity labels, to provide visibility into sensitive data on endpoints, to protect sensitive data based on its content, and to detect and respond to post-breach malicious activity that involves or affects sensitive data.

The post Windows Defender ATP integrates with Microsoft Information Protection to discover, protect, and monitor sensitive data on Windows devices appeared first on Microsoft Secure.

Continue reading...

Step 3. Protect your identities: top 10 actions to secure your environment

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In todays installment, Step 3. Protect your identities, youll learn how to define security policies to protect individual user identities against account compromise and protect your administrative accounts.

The post Step 3. Protect your identities: top 10 actions to secure your environment appeared first on Microsoft Secure.

Continue reading...

Microsoft gains strong customer and analyst momentum in the Cloud Access Security Brokers (CASB) market

Microsoft jumped to the Challenger position in the Gartners 2018 Magic Quadrant for CASB and solidified its Leadership position in KuppingerColes 2018 Leadership Compass in the same product category.

The post Microsoft gains strong customer and analyst momentum in the Cloud Access Security Brokers (CASB) market appeared first on Microsoft Secure.

Continue reading...

Microsoft gains strong customer and analyst momentum in the Cloud Access Security Brokers (CASB) market

Microsoft jumped to the Challenger position in the Gartners 2018 Magic Quadrant for CASB and solidified its Leadership position in KuppingerColes 2018 Leadership Compass in the same product category.

The post Microsoft gains strong customer and analyst momentum in the Cloud Access Security Brokers (CASB) market appeared first on Microsoft Secure.

Continue reading...

Best practices for securely using Microsoft 365—the CIS Microsoft 365 Foundations Benchmark now available

The Center for Internet Securitys (CIS) Microsoft 365 Foundations Benchmark provides prescriptive guidance for establishing a secure baseline configuration for Microsoft 365.

The post Best practices for securely using Microsoft 365—the CIS Microsoft 365 Foundations Benchmark now available appeared first on Microsoft Secure.

Continue reading...

Best practices for securely using Microsoft 365—the CIS Microsoft 365 Foundations Benchmark now available

The Center for Internet Securitys (CIS) Microsoft 365 Foundations Benchmark provides prescriptive guidance for establishing a secure baseline configuration for Microsoft 365.

The post Best practices for securely using Microsoft 365—the CIS Microsoft 365 Foundations Benchmark now available appeared first on Microsoft Secure.

Continue reading...

Guide to Developing a National Cybersecurity Strategy—a resource for policymakers to respond to cybersecurity challenges

Multi-stakeholder collaboration helps to build better security policies in the recently released Guide to Developing a National Cybersecurity Strategy.

The post Guide to Developing a National Cybersecurity Strategy—a resource for policymakers to respond to cybersecurity challenges appeared first on Microsoft Secure.

Continue reading...