CISO Series: Lessons learned from the Microsoft SOC—Part 2a: Organizing people
In the second of our three-part series, we focus on the most valuable resource in the SOC—our people.
In the second of our three-part series, we focus on the most valuable resource in the SOC—our people.
The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. We are defining discrete prescriptive Windows 10 security configurations (levels 5 through 1) to meet many of the common device scenarios we see today in the enterprise.
Microsoft and Forcepoint are working closely to develop an integrated solution that makes it easy to discover, classify, label, and protect critical business data.
Learn about the four cyber hygiene best practices recommended in the 24th edition of the Microsoft Security Intelligence Report (SIR) to help reduce your risk of attack.
If we are to truly influence and shape our industry’s culture, I am asking everyone in the industry to examine how and what we communicate, how we can make cybersecurity easier to understand by the language we use.
In the month of February, we saw an average of 300,000 phishing attempts across Microsoft’s browsing platforms daily. Our security experts expect these attempted scams to become increasingly more prevalent through the April 15 tax day.
We asked Microsoft Graph Security Hackathon participants to come up with innovative solutions using the Microsoft Graph Security API, and they did not disappoint.
Increasingly financial institutions are concerned about their cybersecurity risk. Here are five recommendations can help them more effectively manage that risk.
A recent Forrester study, titled “Security Through Simplicity,” found a correlation between vendor consolidation and strategy modernization to reduce security complexity.
Download the Microsoft Security Intelligence Report Volume 24 and check out the brand new interactive security insights to dig into the latest security trends.
In the first of our three part series, we provide tips on how to manage a security operations center (SOC) to be more responsive, effective, and collaborative.
Working together with government to push a more coordinated effort around infrastructure security—particularly pipelines and utilities—is critical. The new Pipeline Cybersecurity Initiative will help ensure that additional resources, information-sharing, and coordination will help mitigate additional cyber-related risks against the U.S. energy industry in the coming years.