Building the security operations center of tomorrow—better insights with compound detection
Learn how compound detection can help you apply the law of data gravity and correlate insights across your security platforms.
Learn how compound detection can help you apply the law of data gravity and correlate insights across your security platforms.
New capabilities for the Azure Security Center were announced this week at Hannover Messe 2019.
Learn how Microsoft’s latest security product releases and solutions showcased at RSA are helping security professionals do more, better.
Working together with government to push a more coordinated effort around infrastructure security—particularly pipelines and utilities—is critical. The new Pipeline Cybersecurity Initiative will help ensure that additional resources, information-sharing, and coordination will help mitigate additional cyber-related risks against the U.S. energy industry in the coming years.
The “Securing the Future of Artificial Intelligence and Machine Learning at Microsoft” paper outlines net-new security engineering challenges in the AI and machine learning space.
The new Security Engineering website includes security practices to help improve the security of products or cloud services.
To maintain a board’s confidence, you need to engage them in your strategy early and often.
The Voice of the Customer blog series is designed to help you by sharing stories from real customers who are solving their identity and security challenges using Azure AD.
Announcing the Microsoft Graph Security Hackathon! Join today for a chance to win a piece of the $15,000 cash prize pool.
If you are working on initiatives to secure your privileged accounts (and I hope you are), this post is designed to help.
Shawn Anderson, a former CISO, now meets with CISOs every other week to answer their questions on moving to the cloud and where to start. Today, Shawn shows you how you can use the Azure enterprise scaffold to migrate to the cloud—even in a hybrid-cloud environment.
Protecting the company and its users against data leaks is no longer just the responsibility of IT and security operations. Everyone from the board to Firstline Workers has an important role to play.