Security management
Learn how our identity-driven security solutions protect people, devices, and data from potential vulnerabilities at every touchpoint, everywhere they work.
Refine results
Topic
Products and services
Publish date
-
The Microsoft Security partner opportunity grew 21 percent year-over-year, particularly in Microsoft 365 security, cloud security, compliance, and identity. -
How security leaders can help their teams avoid burnout
Maria Markstedter, CEO of Azeria Labs, shares insights on the growing interest in Arm assembly and strategies to help security professionals avoid burnout. -
Streamlining employee onboarding: Microsoft’s response to the Great Reshuffle
Verifiable credentials may help improve employee experience, an important factor HR and IT business leaders must pay attention to as expectations evolve. -
How to improve risk management using Zero Trust architecture
Risk management plays a critical role in helping organizations with their security posture enhancement. -
Microsoft showcases the future of comprehensive security at RSA 2022
RSA 2022 is happening in person—find out about Microsoft-sponsored sessions, pre-day events, speakers, awards, and more. -
Microsoft security experts outline next steps after compromise recovery
A compromise recovery, in general, means that we are implementing several years of work in cybersecurity in only six weeks. -
Building a safer world together with our partners—introducing Microsoft Security Experts
Technology alone is not enough to defend against cybercrime. -
Secure your healthcare devices with Microsoft Defender for IoT and HCL’s CARE
Recently, Microsoft and global technology services firm HCL Technologies teamed up to help solve the security challenge with a high-performance solution for medical devices. -
2.5 million-plus cybersecurity jobs are open—women can fill them
As we celebrate International Women’s Day and Women’s History Month, we examine the potential roadblocks and exciting opportunities for women in cybersecurity. -
Detect active network reconnaissance with Microsoft Defender for Endpoint
Active network reconnaissance is a critical component of the cybersecurity kill chain allowing for network topography and endpoint services to be mapped and used in targeted campaigns. -
Celebrating 20 Years of Trustworthy Computing
20 years ago this week, Bill Gates sent a now-famous email to all Microsoft employees announcing the creation of the Trustworthy Computing (TwC) initiative. -
Build a stronger cybersecurity team through diversity and training
Heath Adams, Chief Executive Officer at TCM Security, offers practical advice on how to build a security team.