yOUTUBE

vIDEOS

Learn about topics such as endpoint protection, detection, response, cloud security, malware defence, identity protection, network, perimeter security and all things cyber security here with Threatscape.

Student with laptop

Complimentary Microsoft 365 Defender Advisory Service

Discover how our complimentary Microsoft 365 Defender Advisory Service helps you make Defender work best for your organisation. With a no-cost, no-obligation consultation with one of our Microsoft security experts, you gain advice and recommendations on what matters most to you in Microsoft 365 Defender – no matter at which point in your journey you are.

Get Your Free Email Fraud Risk Audit with Abnormal Security

Request your complimentary email fraud risk audit today to gain full visibility of the level of risk exposure your business has to email fraud. There is zero impact on your email service, no email leaves your systems, and you can quickly see what your existing defences have missed.

Defender Videos

Use Tamper Protection to stop defence evasion | Defender for Endpoint

Learn how to enable Tamper Protection in Microsoft Defender for Endpoint and see it in action as we demonstrate how to block an administrator trying to bypass Defender Antivirus.

Use Safe Documents to scan files for threats | Microsoft 365 Defender

Learn how to enable Microsoft 365 Defender’s Safe Documents to scan files before users are allowed to “enable editing” on documents to better mitigate risk of access to malicious content.

Stop New Malware with Block at First Sight | Defender for Endpoint

Learn how to use Block at First Sight with Microsoft Defender for Endpoint to protect your organisation from polymorphic malware… in seconds.

Preventing Malware with Microsoft Defender for Cloud Apps

Learn how to better protect your organisation from malware with Microsoft Defender for Cloud Apps.

Block unapproved apps | Defender for Endpoint & Cloud Apps Integration

Learn how to configure the Defender for Endpoint and Defender for Cloud Apps integration to enable easy blocking of unsanctioned apps. 

Stop malware with Attack Surface Reduction | Microsoft 365 Defender

Learn how to set up Attack Surface Reduction rules to block entire types of behaviour, minimising opportunities for attackers to compromise your devices.

Stop impersonation-based email attacks | Microsoft 365 Defender

Impersonation based email attacks are still a widely adopted tactic from bad actors. Learn how user and domain impersonation with Microsoft 365 Defender can help protect internal or third-party users and internal or third-party domains with controls on where these emails will be delivered.

Monitor and Control Web Browsing with Web Content Filter | Microsoft 365 Defender

Learn how to set up Web Content Filtering to better monitor and control the access users have to certain websites.

Isolation & Live Response | Microsoft Defender for Endpoint

Learn how to use Defender for Endpoint’s Isolation and Live Response features to better improve your investigations by restricting the potential lateral movement of a compromised device across your network.

Detect Threats with Microsoft Defender for Identity | Microsoft 365 Defender

Learn how to employ Microsoft Defender for Identity to monitor your on-premises Active Directory and detect suspicious activities within your environment.

Creating Custom Detection Rules | Microsoft 365 Defender

There are many baked in detection rules and alerts in the Microsoft 365 Defender suite, but by employing custom detection rules we can create our own. By leveraging Advanced Hunting and KQL queries we can create new queries that look for specific events and return entities that we can develop specific alerts upon.

Stop impersonation-based email attacks | Microsoft 365 Defender

Impersonation based email attacks are still a widely adopted tactic from bad actors. Learn how user and domain impersonation with Microsoft 365 Defender can help protect internal or third-party users and internal or third-party domains with controls on where these emails will be delivered.

More Videos

How to address growing cyber threats in 2022? Alert Fatigue | Lack of Resources

 IT Security teams face significant challenges in their fight to defend against increasingly sophisticated cyber threats. From alert-fatigue to a major global cyber skills shortage, which leads to under resourcing in this area, these issues only make the task at hand more difficult.

Challenges of Securing Digital Transformation | Cyber Security Post COVID

Digital Transformation means many things to many organisations. It could be moving from on-premise to cloud, automating the business and, in some cases, changing the entire customer engagement. But taking steps to further your organisation’s digital transformation journey during the COVID era of remote working threw up many challenges, not least of which, was security.

Digital Connectivity – OT meets IT | Address Cyber risks and Challenges.

Deploying effective security solutions to an OT environment can be a significant challenge, particularly when deployed on legacy systems, as can be the case in heavy industry manufacturing and energy.