New Blog Post | How to defend against advanced attacks

%3CLINGO-SUB%20id%3D%22lingo-sub-3015384%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20How%20to%20defend%20against%20advanced%20attacks%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3015384%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22SUR22_Go3_Contextual_888_RGB-900x360.png%22%20style%3D%22width%3A%20900px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F330087i89669811127B7FFE%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22SUR22_Go3_Contextual_888_RGB-900x360.png%22%20alt%3D%22SUR22_Go3_Contextual_888_RGB-900x360.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fhow-to-defend-against-advanced-attacks%2Fba-p%2F2986434%22%20target%3D%22_blank%22%3EHow%20to%20defend%20against%20advanced%20attacks%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EThis%20fall%2C%20we%20released%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fnation-state-attacks%23office-ContentAreaHeadingTemplate-hkzu7ix%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EDecoding%20NOBELIUM%3C%2FA%3E%2C%20a%20four-part%20video%20series%20that%20pulls%20back%20the%20curtain%20on%20the%20world%20of%20threat%20detection%20and%20showcases%20the%20incredible%20efforts%20and%20insights%20from%20defenders%20who%20responded%20to%20the%20most%20sophisticated%20nation-state%20attack%20in%20history.%20Since%20we%20first%20started%20sharing%20information%20on%20this%20extremely%20advanced%20threat%20actor%20group%20in%20December%202020%2C%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fquery.prod.cms.rt.microsoft.com%2Fcms%2Fapi%2Fam%2Fbinary%2FRWMFIi%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ewe%20have%20only%20continued%20to%20see%20an%20increase%20in%20nation-state%20activity%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20this%20blog%2C%20we%E2%80%99ll%20share%20some%20of%20the%20insights%20that%20we%20heard%20from%20leading%20cybersecurity%20experts%20while%20filming%20the%20Decoding%20NOBELIUM%20series%20that%20you%20can%20use%20to%20help%20your%20own%20organization%20better%20prepare%20for%20advanced%20attacks.%20This%20guidance%20is%20grounded%20in%20real-world%20examples%20and%20not%20only%20applies%20to%20defending%20against%20advanced%20adversaries%20but%20will%20also%20strengthen%20your%20security%20posture%20against%20more%20common%20threats%20like%20phishing%2C%20email%20compromise%2C%20ransomware%2C%20and%20more.%20Let%E2%80%99s%20dive%20in.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3015384%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

SUR22_Go3_Contextual_888_RGB-900x360.png

How to defend against advanced attacks - Microsoft Tech Community

This fall, we released Decoding NOBELIUM, a four-part video series that pulls back the curtain on the world of threat detection and showcases the incredible efforts and insights from defenders who responded to the most sophisticated nation-state attack in history. Since we first started sharing information on this extremely advanced threat actor group in December 2020, we have only continued to see an increase in nation-state activity.

 

In this blog, we’ll share some of the insights that we heard from leading cybersecurity experts while filming the Decoding NOBELIUM series that you can use to help your own organization better prepare for advanced attacks. This guidance is grounded in real-world examples and not only applies to defending against advanced adversaries but will also strengthen your security posture against more common threats like phishing, email compromise, ransomware, and more. Let’s dive in.

0 Replies