In today’s post, we’ll discuss how to improve your Office 365 data protection and threat mitigation approach to better protect your environment from external threats. In our previous post about Office 365 security features, we outlined how to make the deluge of Office 365 security event information actionable. We also highlighted the importance of implementing sound identity, access, and privilege management approaches. Now let’s see what else you… Read More
Category: Cloud Security
Office 365 Security Features Demystified
Microsoft has numerous Office 365 security features built in to help you monitor activity, protect data, identify threats, and manage identity, access, and privileges. But getting the most out of those tools can be difficult, particularly for mid-sized organizations. Integrating them with data from other sources in your network and cloud is even more challenging…. Read More
2019 Cloud Security Research: Take the Survey and Get the Free Report
Delta Risk has partnered with Cybersecurity Insiders to examine the latest trends in cloud security. Everyone who completes this comprehensive survey will receive a copy of the complete 2019 Cloud Security Report as a thank you as soon as it is published. The survey is based on real-time feedback from IT security professionals in the… Read More
Q & A: Common Misconceptions about Security in Hybrid Environments
In advance of our upcoming webinar on “How to Prepare for and Recover from Attacks in Hybrid Enterprise Environments,” Lauren Bellero spoke with the presenters, Macie Thompson, CISSP, Director of Delta Risk’s Incident Response team, and Chris Murphy, CISSP, Director of Solution Architecture Managed Security Services. The team discussed some of the common misconceptions about security… Read More
Security Considerations for AWS Setup Outlined in New Video
The Delta Risk Cloud Security Team just released a new video, “Key Security Considerations for AWS.” If your business is using AWS or Azure cloud infrastructure for new application development, or even to migrate legacy applications, you’ll benefit from watching the video. With security and compliance as a top concern, you need to be able to mitigate… Read More
GAO: Federal Agencies Still Vulnerable to Cyber Attacks
The Government Accountability Office (GAO) says in a new study, GAO-19-105: Federal Information Security, that most federal agencies are falling behind on implementing federal cyber security standards. The study said federal agencies need improvement and called on the agencies to do a better job protecting against intrusions. The GAO uses the NIST Cybersecurity Framework (CSF) to… Read More