Microsoft bolsters its security features through a phishing attack simulator
Phishing attacks are some of the common and popular information extortion methods used by hackers. Although some of these phishing attacks can be smartly dodged by knowing what one clicks on, simulating such threats could go a long way in understanding the precautionary measures that could potentially prevent any unforeseen damages.
As a countermeasure to such threats, Microsoft recently launched a series of security tools, one of them being a phishing attack simulator, right before the RSA conference to be held in San Francisco. Majorly reliant on the Microsoft Intelligent Security Graph, the security tools that detect these attacks encompass various platforms and services. Microsoft’s Andrew Conway describes the toolsets as “central nervous system for security solutions.”
The company leverages expertise from analyzing various sources of data such as email accounts, web pages, and malware threats occurring on their windows platform to keep users safe from existing and newer threats. Conditional access, a feature based on Intelligent Security Graph, grants access to Office 365 services only to the users that have been authenticated previously or use devices that comply with the prerequisites of the platform. This data then merges with the Windows Defender Advanced Threat Protection (ATP) scanner to grant permission to healthy devices only. According to the company that these features will be publically available with the succeeding iterations of Windows 10, allowing users to benefit from these security protocols on the go.
By Chris Tjotjos, VP, Cisco Solutions Practice, Black Box...
By Laura Jackson, Sr. Manager-Risk Management, ABS Consulting
By Jason Cradit, VP of Information Systems, Willbros Group
By Steve Garske, Ph.D., Senior Vice President & Chief...
By Roman Trakhtenberg, CEO, Luxoft
By Renee P Wynn, CIO, NASA
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Andrew Macaulay, CTO, Topgolf Entertainment Group
By Dominic Casserley, President and Deputy CEO, Willis...
By Dave Nelson, SVP-Portfolio Lead, Avanade, Inc.
By Michael Cross, SVP & CIO, CommScope Holding Company Inc.
By Pauly Comtois, VP DevOps, Hearst Business Media
By Dan Adam, CIO, Extreme Networks
By Matt Schlabig, CIO, Worthington Industries
By David Tamayo, CIO, DCS Corporation
By Scott Cardenas, CIO, City and County of Denver
By Marc Kermisch, VP & CIO, Red Wing Shoe Co.
By Brian Drozdowicz, VP, Digital Services, Siemens...
By Les Ottolenghi, EVP and CIO, Caesars Entertainment