Microsoft Security Intelligence Report Volume 24 is now available
Download the Microsoft Security Intelligence Report Volume 24 and check out the brand new interactive security insights to dig into the latest security trends.
Download the Microsoft Security Intelligence Report Volume 24 and check out the brand new interactive security insights to dig into the latest security trends.
In the first of our three part series, we provide tips on how to manage a security operations center (SOC) to be more responsive, effective, and collaborative.
Multi-stakeholder collaboration helps to build better security policies in the recently released Guide to Developing a National Cybersecurity Strategy.
Cybersecurity hygiene is about maintaining cyberhealth by developing and implementing a set of tools, policies, and practices to increase your organization’s resiliency in the face of attacks and exploits.
In this blog, Jonathan Trull shares methods he uses to prioritize where and how he spends his resources to achieve the largest security improvements.
With the U.S. midterm elections rapidly approaching, campaigns must be vigilant in protecting against cyberattacks to their online collaboration tools, including email. Microsoft has compiled a list of 10 high-impact, easy-to-implement security settings that any campaign or election organization should consider for increased security in Microsoft 365.
My passion is the connection of security to the business objectives, and it has been a part of my work with many CISOs across industries as well as my experience as a CISO.
You’re driving a long, dark road on a rainy night.
It’s no secret that Microsoft has embraced the cloud in a big way—from enterprise solutions like Microsoft Azure to Office 365 and Windows.
This blog is part of a series that responds to common questions we receive from customers about Microsoft 365 Security and Enterprise Mobility + Security. In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization.
For several years now, policymakers and practitioners from governments, CERTs, and the security industry have been speaking about the importance of public-private partnerships as an essential part of combating cyber threats. It is impossible to attend a security conference without a keynote presenter talking about it.
This post is authored by Berk Veral, Director, Product Marketing, Enterprise Cybersecurity Group. Across industries, as attack methods have become more sophisticated and complex, organizations have been responding by deploying more security solutions, which in turn has tremendously increased the complexity of security management.