Guarding against supply chain attacks—Part 1: The big picture
Paying attention to every link in your supply chain is vital to protect your assets from supply chain attacks.
Paying attention to every link in your supply chain is vital to protect your assets from supply chain attacks.
To plan, implement, and improve an enterprise patch management strategy, Microsoft is partnering with the National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellence (NCCoE). Learn how you can also help.
One of the best ways to thwart cybercrime is to involve security experts before deploying new products and services.
In the next post of our series, we provide tips on choosing technology to help a security operations center (SOC) be more responsive, effective, and collaborative.
Turn on MFA and start building a long-term authenticator strategy that relies on “phish proof” authenticators, such as Windows Hello and FIDO.
To keep pace with cyberthreats and attract critical talent, we need to change the cyber learning paradigm.
Results from the 2019 Marsh-Microsoft Global Cyber Risk Perception survey reveal several encouraging signs of improvement in the way organizations view and manage cyber risk.
Operational resilience cannot be achieved without a true commitment to and investment in cyber resilience.
Are today’s students getting the preparation they need to do the cybersecurity work of tomorrow? Read the findings from the U.S. Department of Energy (DOE) CyberForce Competition.
In part 1 of our two-part series, we introduce a security minded audience to Microsoft Flow—an automation service with a strong security and compliance foundation.
Security vendors and professionals often use complex words and terminology to describe simple concepts. Here are few guidelines to consider when naming or describing your products, services, and features.
Learn about common vulnerabilities and what you can do to protect your company from attacks.