Zero Trust Reference Architecture

Zero Trust (ZT) is a cybersecurity strategy and framework that embeds security throughout the architecture to prevent malicious personas from accessing our most critical assets. It provides zones for visibility and information technology (IT) mechanisms positioned throughout the architecture to secure, manage and monitor every device, user, application, and network Read more

By [email protected], ago

Microsoft Cybersecurity Reference Architectures – Security documentation

The Microsoft Cybersecurity Reference Architectures (MCRA) describe Microsoft’s cybersecurity capabilities. The diagrams describe how Microsoft security capabilities integrate with Microsoft platforms and 3rd party platforms like Microsoft 365, Microsoft Azure, 3rd party apps like ServiceNow and salesforce, and 3rd party platforms like Amazon Web Services (AWS) and Google Cloud Platform Read more

By [email protected], ago

Human Operated Ransomware | Microsoft Docs

Human operated ransomware is a large and growing attack trend that represents a threat to most industries. Human operated ransomware is different than commodity ransomware. These “hands-on-keyboard” attacks leverage human attackers’ knowledge of common system and security misconfigurations to infiltrate a compromised network and to adapt to the network and Read more

By [email protected], ago

Human Operated Ransomware | Microsoft Docs

Human operated ransomware is a large and growing attack trend that represents a threat to most industries. Human operated ransomware is different than commodity ransomware. These “hands-on-keyboard” attacks leverage human attackers’ knowledge of common system and security misconfigurations to infiltrate a compromised network and to adapt to the network and Read more

By [email protected], ago