Finding a common language to describe AI security threats
Microsoft published a series of materials that define common vocabulary that can be used to describe intentional and unintentional failures.
Microsoft published a series of materials that define common vocabulary that can be used to describe intentional and unintentional failures.
Joy Chik, Microsoft CVP, Identity, explains how passwordless works and provides steps to begin preparing your organization to eliminate passwords.
Gamified cybersecurity solutions offer immense promise by giving users practical, hands-on opportunities to learn by doing. Microsoft and Circadence are partnering to deliver Azure-hosted cyber range learning solutions for beginners up to advanced SecOps pros.
Ann Johnson shares best practices and tips on how to balance security with privacy compliance from her visit with Emma Smith, Global Security Director at Vodafone Group.
Top 10 announcements from the Microsoft Ignite Conference across security, compliance, and identity.
Microsoft Corporate Vice President and CISO, Bret Arsenault, describes how Microsoft is approaching Zero Trust with advice for applying learnings to your organization.
One of the best ways to thwart cybercrime is to involve security experts before deploying new products and services.
In part 2 of our two-part series, we go deeper into how Microsoft Flow secures your users and data, as well as enhances the IT experience.
Security vendors and professionals often use complex words and terminology to describe simple concepts. Here are few guidelines to consider when naming or describing your products, services, and features.
A collaborative, inclusive approach to creating AI and machine learning models can help increase your resilience to cyberattacks.
DART recently worked with a customer who had been subject to a targeted compromise where the entity was intently and purposefully attempting to get into their systems.
Actionable tips from security experts on how to prevent, mitigate, or recover from a cyberattack.