Identity is the new security perimeter - and it’s under constant attack! In the face of more than 7,000 password attacks every second and identity compromise involved in 66% of those attacks, we knew we had to rethink how we defend identities. That’s why I’m excited to share how we’re strengthening identity defense with deeper correlation, richer context, and improved protection across Microsoft Entra. Our teams at Microsoft have built out expanded Identity Threat Detection and Response (ITDR) capabilities—covering human and non-human identities, on-premises and in the cloud. These advancements help security teams detect sophisticated attacks faster and respond with confidence. Every day, attackers are getting smarter. To stay ahead, we’ve focused on three things: ✔️ Better detection and correlation to spot advanced threats quickly ✔️ Richer context so defenders can make informed decisions ✔️ Improved protections that help stop compromise before it starts These enhancements aren’t just features—they’re part of our commitment to help our customers build resilience and trust in a world where identity is everything. I recommend reading the blog if you want to learn more about what’s new and how it can help you protect your environment.
Microsoft Entra: Strengthening Identity Defense Against Sophisticated Attacks
More Relevant Posts
-
🔐 Identity is the new security perimeter—and it’s under siege. 💬 Question for you: How is your organization adapting its identity strategy for a world where every identity -human or machine- is a potential attack vector? 🌐With hybrid work and multicloud environments, attackers exploit every gap in identity protection. Did you know there are 7,000 password attacks every second and that 66% of attack paths involve identity compromise? Microsoft’s latest update to Defender for Identity takes a bold step forward: ✅ Improved protection with unified identity and endpoint sensors ✅ Deeper correlation across signals from Entra ID, on-prem AD, and even third-party platforms like Okta ✅ Richer context for SOC teams to accelerate detection and response 🔍This isn’t just about patching holes—it’s about building resilience with integrated ITDR (Identity Threat Detection and Response) that spans human and non-human identities, cloud and on-prem, Microsoft and beyond. 🔐 As identity threats evolve, so must our defenses. AI-driven anomaly detection, risk-based Conditional Access, and automated attack disruption are no longer optional—they’re essential. 👉 Read the full blog here: https://lnkd.in/eb3ZHumA #CyberSecurity #IdentityProtection #MicrosoftDefender #ZeroTrust #ITDR #SkilledByMTT
To view or add a comment, sign in
-
🚨 Identity is the new security perimeter — and Microsoft is raising the bar. In today’s hybrid, cloud-first world, identity threats are surging. With 7,000+ password attacks per second and AI-driven non-human identities on the rise, traditional defenses aren’t enough. 🔐 Microsoft Defender for Identity is evolving: Unified sensors for on-prem + cloud environments Deeper correlation across accounts, platforms, and environments Context-rich alerts integrated into Defender XDR Automatic attack disruption for smarter, faster response Support for multivendor ecosystems like Okta The goal? A seamless, identity-centric threat defense that empowers SOC teams to detect earlier, respond faster, and reduce risk across the board. 💡 Visibility. Context. Control. That’s the future of identity security. #CyberSecurity #IdentityProtection #MicrosoftDefender #ITDR #SOC #ZeroTrust #MicrosoftSecurity #AI #CloudSecurity
To view or add a comment, sign in
-
Microsoft has just announced major enhancements to identity protection in Microsoft Entra, focusing on three key pillars: improved protection, deeper correlation, and richer context. These updates aim to help organizations detect and respond to identity-based threats more effectively by leveraging advanced signals, AI-driven insights, and tighter integration across Microsoft’s security ecosystem. As identity remains the new perimeter, these innovations are a critical step forward in securing access and reducing risk across hybrid environments. #MicrosoftEntra #IdentityProtection #ZeroTrust #CloudSecurity https://t.co/EosWc9MFrA
To view or add a comment, sign in
-
Let’s build identity systems that not only detect but also predict. Identity is the new security perimeter, and attackers know it. Microsoft just announced major advancements in Defender for Identity and Microsoft Defender XDR—bringing deeper signal correlation, contextual intelligence, and protection that spans human and non-human identities. 👉 Learn how Microsoft is redefining Identity Threat Detection and Response (ITDR) with richer insights, unified correlation, and AI-driven investigation: 🔗 https://lnkd.in/gMCqKy7R Because identity isn’t just another control — it’s your organisation’s digital perimeter. #MicrosoftSecurity #DefenderXDR #IdentitySecurity #ITDR #ZeroTrust #CyberSecurity #ThreatIntelligence #DefenderForIdentity #SOC #SecurityOperations #EntraID #CloudSecurity #XDR #AIinSecurity #SecurityLeadership #DigitalTransformation #SecurityAwareness #IdentityProtection #EnterpriseSecurity #MicrosoftEntra
To view or add a comment, sign in
-
In today’s hybrid and cloud-first business world, the identity perimeter is increasingly complex and the stakes have never been higher. Microsoft’s latest article reveals how Defender for Identity and Entra are reimagining Identity Threat Detection and Response (ITDR) bridging on-premises and cloud, human and non-human identities, and even multi-vendor ecosystems. Key takeaways for security and IAM teams: • Unified sensors now provide enriched visibility into your identity fabric, empowering security operations to detect and respond to threats faster and smarter. • Deep integrations, from AD to Entra and Okta, enable coordinated threat response across endpoints, identities, and cloud resources. • Contextual insights and automatic attack disruption allow teams to move from detection to decisive action—a game-changer amid rising password and identity-based attacks. The article is a must-read for anyone serious about modernizing their identity defense and bridging gaps between teams and technologies. Find out how Microsoft is delivering richer context, deeper correlation, and automatic disruption to empower defenders Read the full article: https://lnkd.in/dDmcfwq2 #IAM #Cybersecurity #ITDR #MicrosoftDefender #IdentitySecurity #CloudSecurity #SIEM #SecurityOperations
To view or add a comment, sign in
-
🛡️ Identity Is the New Perimeter — And It’s Under Siege With 7,000+ password attacks per second and 66% of attack paths involving identity compromise, Microsoft is reimagining how we defend identities in a hybrid, cloud-first world. 🚀 What’s new: Unified identity + endpoint sensors now generally available Deep visibility across on-prem & cloud identities (including Okta!) Shift from account-centric to identity-centric threat detection Integrated Privileged Access Management (PAM) for high-value targets AI-powered attack disruption that contains users, devices & sessions 🔍 Microsoft Defender for Identity + Entra ID = a connected, contextual, and coordinated defense strategy. 💡 In today’s threat landscape, partial visibility isn’t enough. It’s time to see more, know more, and respond smarter. #CyberSecurity #IdentitySecurity #MicrosoftDefender #EntraID #ITDR #SOC #ZeroTrust #AIpoweredSecurity #SecurityLeadership
To view or add a comment, sign in
-
🎉 Our unified identity and endpoint sensor is Generally Available! Customers are already activating identity protections on qualifying domain controllers and gaining identity-specific visibility, posture recommendations, alerts, and automatic attack disruption, all within the #MicrosoftDefender experience. With this GA, you can: ✅ Strengthen defenses with improved identity protection, deeper correlation, and richer context to stop attacks before they escalate. ✅ Unify signals across Microsoft Defender and Entra for faster detection and response. ✅ Simplify deployment so teams can enable these protections quickly and reduce operational overhead. These enhancements help security teams detect and respond to threats faster, reduce risk, and stay ahead of evolving attacks. Learn more: https://lnkd.in/g7-VSJH6 and https://lnkd.in/gfWycSZr #MicrosoftSecurity #IdentityProtection #EndpointSecurity #ZeroTrust #CyberSecurity
To view or add a comment, sign in
-
🚨 3 major security reports dropped in the last 2 weeks, and they all said the same thing. ENISA, CrowdStrike, and Microsoft all published research pointing to the same critical gap: the browser is now the biggest attack surface most security teams aren't protecting. Here's what caught my attention: ▸ CrowdStrike: 79% of cyberattack detections in 2024 were malware-free. Identity-based intrusions showed up in 35% of cloud incidents Attackers aren't breaking in anymore -- they're just signing in. Oh, and the average time before they start moving around your network? 48 minutes. Fastest was 51 seconds! ▸ Microsoft: Infostealers are quietly grabbing browser session tokens at scale. 97% of identity attacks are still just password guessing, and 99% of them could be stopped with phishing-resistant MFA. So why aren't they? Because most teams can't see where the problem actually is. ▸ ENISA: By early 2025, over 80% of social engineering was AI-powered. Also, there was a surge in compromised Chrome extensions in late 2024 -- especially ones for AI tools and VPNs. You know, the exact stuff everyone's installing right now. Identity risk isn't where we think it is anymore. It's moved out of the corporate environment and into: *That browser extension someone on your team installed last Tuesday *Personal Gmail accessing corporate Google Workspace *Unmanaged laptops with synced credentials *Session tokens that stay valid even after a password reset (yes, really) If your team is working in a browser 8+ hours a day, that's your perimeter now. The question security teams are starting to ask is no longer "What's happening at the endpoint?" It's "What's happening inside the browser?" Things like: *Which extensions can see our corporate sessions? *Where are employees actually using our SaaS credentials? *Can we even detect session hijacking when it happens? *How do we enforce Zero Trust when we can't see half the identity sprawl? This reads like a roadmap of where identity attacks are headed over the next 18 months . . .worth paying attention to. Curious what others are seeing -- are you getting visibility into browser-based identity risks, or is this still a blind spot for most teams?
To view or add a comment, sign in
-
3 major security reports dropped in the last 2 weeks, and they all said the same thing. ENISA, CrowdStrike, and Microsoft all published research pointing to the same critical gap: the browser is now the biggest attack surface most security teams aren't protecting. Here's what caught my attention: ▸ CrowdStrike: 79% of cyberattack detections in 2024 were malware-free. Identity-based intrusions showed up in 35% of cloud incidents Attackers aren't breaking in anymore -- they're just signing in. Oh, and the average time before they start moving around your network? 48 minutes. Fastest was 51 seconds! ▸ Microsoft: Infostealers are quietly grabbing browser session tokens at scale. 97% of identity attacks are still just password guessing, and 99% of them could be stopped with phishing-resistant MFA. So why aren't they? Because most teams can't see where the problem actually is. ▸ ENISA: By early 2025, over 80% of social engineering was AI-powered. Also, there was a surge in compromised Chrome extensions in late 2024 -- especially ones for AI tools and VPNs. You know, the exact stuff everyone's installing right now. Identity risk isn't where we think it is anymore. It's moved out of the corporate environment and into: *That browser extension someone on your team installed last Tuesday *Personal Gmail accessing corporate Google Workspace *Unmanaged laptops with synced credentials *Session tokens that stay valid even after a password reset (yes, really) If your team is working in a browser 8+ hours a day, that's your perimeter now. The question security teams are starting to ask isn't "What's happening at the endpoint?" anymore. It's "What's happening inside the browser?" Things like: *Which extensions can see our corporate sessions? *Where are employees actually using our SaaS credentials? *Can we even detect session hijacking when it happens? *How do we enforce Zero Trust when we can't see half the identity sprawl? This reads like a roadmap of where identity attacks are headed over the next 18 months . . .worth paying attention to. Curious what others are seeing -- are you getting visibility into browser-based identity risks, or is this still a blind spot for most teams?
To view or add a comment, sign in
-
Comprehensive Identity Protection Across Cloud and On-Premises: A Strategic Imperative In today’s hybrid world, identity is the new security perimeter. Organizations operate across cloud, on-premises, and edge environments, creating unprecedented complexity—and opportunity. With identity-based attacks increasing in speed and sophistication, protecting identities everywhere is no longer optional; it’s mission-critical. Microsoft’s approach to comprehensive identity protection unifies security across environments, delivering: - End-to-End Coverage – From legacy on-prem systems to modern SaaS apps, Microsoft Entra and Defender for Identity provide seamless protection. -Adaptive Risk-Based Access – Real-time risk evaluation during authentication, integrated with Conditional Access policies, ensures precision without sacrificing productivity. - Integrated Threat Detection and Response – Identity Threat Detection and Response (ITDR) capabilities contextualize identity alerts within broader incidents, enabling faster, coordinated responses. - Zero Trust Foundation – Enforce strong authentication, privileged access management, and continuous monitoring to reduce attack surfaces. Why does this matter? Hybrid environments are here to stay, and attackers know it. Credentials remain the #1 target, with 7,000 password attacks per second and a surge in adversary-in-the-middle phishing campaigns. A fragmented security strategy is no longer viable—organizations need native, unified solutions that bridge identity and security teams, automate detection, and accelerate response. This is more than technology; it’s about resilience and trust. By consolidating identity protection under a single, integrated framework, Microsoft empowers organizations to safeguard their most critical asset—identity—while enabling innovation and collaboration without compromise. Explore the full blog here: https://lnkd.in/eghze7wa #fasttrack #m365 #o365 Microsoft Tribal Microsoft 365 Microsoft Security Microsoft Cloud Microsoft in Government
To view or add a comment, sign in
Long awaited, excited to see the new features.