How Office 365 learned to reel in phish
Find out how Office 365 learned to mitigate phishing attacks.
Find out how Office 365 learned to mitigate phishing attacks.
In this post we address the question: “How do we make data gravity a reality in the security operations center (SOC) while we are under increased and constant pressure from motivated threat actors?
Cybersecurity is the central challenge of our digital age. Without it, everything from our personal email accounts and privacy to the way we do business, and all types of critical infrastructure, are under threat. As attackers evolve, staying ahead of these threats is getting harder. Microsoft can help.
This year at Ignite, Microsoft announces exciting innovations in identity management, information protection, threat protection, security management, and more.
How can we build the SOC of tomorrow? By respecting the law of data gravity. If we can perform security analytics close to where the data already is, we can increase the speed of response.
This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this blog, we explain how Microsoft 365 threat protection solutions interoperate threat detection across these attack vectors.
Each year more and more governments are developing policies to address security challenges presented by an increasingly digitized world. We are excited to announce the release of Microsoft’s new Cybersecurity Policy Framework—an indispensable resource for the policymakers joining this work.
First in a three part series that provides an in-depth look at how Microsoft 365 Security integrates into the broader cybersecurity industry.
This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization. Check out our last blog Getting the most value out of your security deployment.
This post is authored by Cyril Voisin, Chief Security Advisor, Enterprise Cybersecurity Group. Nowadays every company is becoming a digital company to some extent. Digital transformation changes the way business is done.
The Microsoft Cybersecurity Reference Architecture describes Microsoft’s cybersecurity capabilities and how they integrate with existing security architectures and capabilities.
If we’ve learned anything from the rise of Marvel Cinematic Universe, it’s that good things tend to happen when heroes intervene. For securing new applications, this metaphor is a useful one because security isn’t always top-of-mind for scrum teams, nor is it always conducive to meeting aggressive deadlines.