3 Novembre 2022
Stopping C2 communications in human-operated ransomware through network protection

Command-and-control (C2) servers are an essential part of ransomware, commodity, and nation-state attacks. They are used to control infected devices and perform malicious activities like downloading and launching payloads, controlling botnets, or commanding post-exploitation penetration frameworks to breach an organization as part of a ransomware attack. Blocking these[…]

Read More
3 Novembre 2022
Microsoft delivers Azure Commercial offering for Criminal Justice Information

Since 2014, United States criminal justice agencies have been managing Criminal Justice Information in Microsoft Azure Government. This cloud platform was developed to support critical compliance standards including the Federal Bureau of Investigation’s (FBI’s) Criminal Justice Information Services (CJIS) Security Policy and: Has the physical controls required by Section[…]

Read More
2 Novembre 2022
General availability: Ephemeral OS disk support for confidential virtual machines

Create confidential VMs using Ephemeral OS disks for your stateless workloads. Source: Microsoft Azure – aggiornamenti

Read More
2 Novembre 2022
Public preview: New Azure Maps Creator feature – Dataset with GeoJSON

Azure Maps Creator enables you to create Indoor Maps with GeoJSON. Source: Microsoft Azure – aggiornamenti

Read More
2 Novembre 2022
Microsoft Security tips for mitigating risk in mergers and acquisitions

Sixty-two percent of organizations that undertake mergers and acquisitions face significant cybersecurity risks or consider cyber risks their biggest concern post-acquisition.1 Threat actors that focus on corporate espionage often target the acquiring company, which we will refer to as the Parent, early in the bidding process to gain[…]

Read More