CISO series: Lessons learned—4 priorities to achieve the largest security improvements
In this blog, Jonathan Trull shares methods he uses to prioritize where and how he spends his resources to achieve the largest security improvements.
In this blog, Jonathan Trull shares methods he uses to prioritize where and how he spends his resources to achieve the largest security improvements.
With the U.S. midterm elections rapidly approaching, campaigns must be vigilant in protecting against cyberattacks to their online collaboration tools, including email. Microsoft has compiled a list of 10 high-impact, easy-to-implement security settings that any campaign or election organization should consider for increased security in Microsoft 365.
My passion is the connection of security to the business objectives, and it has been a part of my work with many CISOs across industries as well as my experience as a CISO.
You’re driving a long, dark road on a rainy night.
It’s no secret that Microsoft has embraced the cloud in a big way—from enterprise solutions like Microsoft Azure to Office 365 and Windows.
This blog is part of a series that responds to common questions we receive from customers about Microsoft 365 Security and Enterprise Mobility + Security. In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization.
For several years now, policymakers and practitioners from governments, CERTs, and the security industry have been speaking about the importance of public-private partnerships as an essential part of combating cyber threats. It is impossible to attend a security conference without a keynote presenter talking about it.
This post is authored by Berk Veral, Director, Product Marketing, Enterprise Cybersecurity Group. Across industries, as attack methods have become more sophisticated and complex, organizations have been responding by deploying more security solutions, which in turn has tremendously increased the complexity of security management.
On May 16-17, Microsoft participated in a workshop organized by the National Institute of Standards and Technology (NIST) on its recently released Framework for Improving Critical Infrastructure Cybersecurity (“Cybersecurity Framework”) Draft Version 1.1.
Earlier this year, my team and I had the great privilege and pleasure of spending several days in Japan, participating in the Information Technology Promotion Agency (IPA) Symposium.
In 2005, just over a decade ago, the majority of large internet user populations, certainly as a percentage of their total national population, were still to be found in North America and Europe. In 2025, less than a decade from now, many of the largest internet user populations will be in Asia.
I was in the midst of composing this blog on diversity in cybersecurity when a Fortune article on Women in Cybersecurity found its way to my LinkedIn feed. It was promoted to me by a man I know and respect.