Microsoft unifies SIEM and XDR to help stop advanced attacks
Learn how Microsoft is taking the next step in unifying experiences and delivering enhanced tools and intelligence to stop advanced attacks.
Learn how Microsoft is taking the next step in unifying experiences and delivering enhanced tools and intelligence to stop advanced attacks.
New Microsoft compliance capabilities enable you to extend data protection and governance across apps, endpoints, and platforms to keep your people collaborative and productive, while ensuring your most valuable asset—your data—remains secure and compliant wherever it lives.
Microsoft listed as a Representative Vendor in the 2020 Market Guide for Insider Risk Management Solutions. Insider Risk Management is used worldwide to identify and manage insider risks, while maintaining employee privacy.
Learn how Microsoft ensures operational resilience for Azure datacenters with Azure Defender for IOT and Azure Sentinel
Microsoft Defender for Endpoint provides the right security intelligence for Expel to analyze rich data and provide support for their customers.
This blog shares the results of Total Economic Impact Study, creating a framework for organizations to evaluate the financial impact of Azure Security Center.
The recent SolarWinds attack is a moment of reckoning. Today, as we close our own internal investigation of the incident, we continue to see an urgent opportunity for defenders everywhere to unify and protect the world in a more concerted way.
What’s the future of security operations? Dave Kennedy, Founder of Binary Defense, shares his insights on threat hunting, incident response, and more with Microsoft.
The corporate network perimeter has been completely redefined. Many IT leaders are adopting a Zero Trust security model where identities play a critical role in helping act as the foundation of their modern cybersecurity strategy. As a result, cybercriminals have shifted their focus and identities are increasingly under attack.
Since December, the United States, its government, and other critical institutions including security firms have been addressing the world’s latest serious nation-state cyberattack, sometimes referred to as ‘Solorigate’ or ‘SUNBURST.’ As we shared earlier this is a moment of reckoning for our industry and needs a unified response of defenders across public and private sectors.
In technical literature, the terms data discovery, classification, and tagging are sometimes used interchangeably, but there are real differences in what they actually mean—and each plays a critical role in an enterprise data protection strategy.
From the global pandemic to recent cyberattacks, our world has faced many challenges during the past 12 months. Some of these challenges we can’t change. However, I’m pleased about the ones we can, and are changing across the cybersecurity landscape.