Skip to main content
Skip to main content
Microsoft
Microsoft Security
Microsoft Security
Microsoft Security
Home
Solutions
Cloud security
Frontline workers
Identity & access
Industrial & critical infrastructure
Information protection & governance
IoT security
Passwordless authentication
Phishing
Ransomware
Risk management
Secure remote work
SIEM & XDR
Small & medium business
Zero Trust
Products
Product families
Product families
Microsoft Defender
Microsoft Entra
Microsoft Intune
Microsoft Priva
Microsoft Purview
Microsoft Sentinel
Identity & access
Identity & access
Azure Active Directory part of Microsoft Entra
Microsoft Entra Identity Governance
Microsoft Entra Permissions Management
Microsoft Entra Verified ID
Microsoft Entra Workload Identities
Azure Key Vault
SIEM & XDR
SIEM & XDR
Microsoft Sentinel
Microsoft Defender for Cloud
Microsoft 365 Defender
Microsoft Defender for Endpoint
Microsoft Defender for Office 365
Microsoft Defender for Identity
Microsoft Defender for Cloud Apps
Microsoft Defender Vulnerability Management
Microsoft Defender Threat Intelligence
Cloud security
Cloud security
Microsoft Defender for Cloud
Microsoft Defender Cloud Security Posture Mgmt
Microsoft Defender for DevOps
Microsoft Defender External Attack Surface Management
Azure Firewall
Azure Web App Firewall
Azure DDoS Protection
GitHub Advanced Security
Endpoint security
Endpoint security
Microsoft 365 Defender
Microsoft Defender for Endpoint
Microsoft Defender for IoT
Microsoft Defender for Business
Microsoft Defender Vulnerability Management
Risk management & privacy
Risk management & privacy
Microsoft Purview Insider Risk Management
Microsoft Purview Communication Compliance
Microsoft Purview eDiscovery
Microsoft Purview Compliance Manager
Microsoft Purview Audit
Microsoft Priva Risk Management
Microsoft Priva Subject Rights Requests
Information protection
Information protection
Microsoft Purview Information Protection
Microsoft Purview Data Lifecycle Management
Microsoft Purview Data Loss Prevention
Endpoint management
Endpoint management
Microsoft Intune Core
Services
Microsoft Security Experts
Microsoft Defender Experts for Hunting
Microsoft Security Services for Enterprise
Microsoft Security Services for Incident Response
Microsoft Security Services for Modernization
Partners
Resources
Get started
Get started
Cybersecurity awareness
Customer stories
Security 101
Product trials
How we protect Microsoft
Reports and analysis
Reports and analysis
Industry recognition
Microsoft Security Insider
Microsoft Digital Defense Report
Security Response Center
Community
Community
Microsoft Security Blog
Microsoft Security Events
Microsoft Tech Community
Documentation and training
Documentation and training
Documentation
Technical Content Library
Training & certifications
Cyberattack support
Cyberattack support
Under attack?
Additional sites
Additional sites
Compliance Program for Microsoft Cloud
Microsoft Trust Center
Security Engineering Portal
Service Trust Portal
Contact Sales
More
Start free trial
All Microsoft
Global
Microsoft Security
Azure
Dynamics 365
Microsoft 365
Microsoft Teams
Windows 365
Tech & innovation
Tech & innovation
Microsoft Cloud
AI
Azure Space
Mixed reality
Microsoft HoloLens
Microsoft Viva
Quantum computing
Sustainability
Industries
Industries
Education
Automotive
Financial services
Government
Healthcare
Manufacturing
Retail
All industries
Partners
Partners
Find a partner
Become a partner
Partner Network
Find an advertising partner
Become an advertising partner
Azure Marketplace
AppSource
Resources
Resources
Blog
Microsoft Advertising
Developer Center
Documentation
Events
Licensing
Microsoft Learn
Microsoft Research
View Sitemap
Search
Search Microsoft Security
No results
Cancel
Sign in
CISO series
Featured image for Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective
February 24, 2021
• 5 min read
Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective
Get insights on how to work with business leaders to manage risk and defend against sophisticated cyber threats.
Read more
Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective
Featured image for Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic
February 16, 2021
• 2 min read
Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic
The pandemic is exposing weaknesses in cybersecurity—learn why an integrated security solution can help combat emerging cyber threats.
Read more
Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic
Featured image for CISO Spotlight: How diversity of data (and people) defeats today’s cyber threats
October 20, 2020
• 4 min read
CISO Spotlight: How diversity of data (and people) defeats today’s cyber threats
This year, we have seen five significant security paradigm shifts in our industry. This includes the acknowledgment that the greater the diversity of our data sets, the better the AI and machine learning outcomes. This diversity gives us an advantage over our cyber adversaries and improves our threat intelligence. It allows us to respond swiftly…
Read more
CISO Spotlight: How diversity of data (and people) defeats today’s cyber threats
Featured image for CISO Stressbusters: 7 tips for weathering the cybersecurity storms
October 15, 2020
• 6 min read
CISO Stressbusters: 7 tips for weathering the cybersecurity storms
An essential requirement of being a Chief Information Security Officer (CISO) is stakeholder management. In many organizations, security is still seen as a support function; meaning, any share of the budget you receive may be viewed jealously by other departments. Bringing change to an organization that’s set in its ways can be a challenge (even…
Read more
CISO Stressbusters: 7 tips for weathering the cybersecurity storms
Featured image for Becoming resilient by understanding cybersecurity risks: Part 1
October 13, 2020
• 4 min read
Becoming resilient by understanding cybersecurity risks: Part 1
All risks have to be viewed through the lens of the business or organization. While information on cybersecurity risks is plentiful, you can’t prioritize or manage any risk until the impact (and likelihood) to your organization is understood and quantified. This rule of thumb on who should be accountable for risk helps illustrate this relationship:…
Read more
Becoming resilient by understanding cybersecurity risks: Part 1
Featured image for How to implement Multi-Factor Authentication (MFA)
January 15, 2020
• 9 min read
How to implement Multi-Factor Authentication (MFA)
The goal of MFA implementation is to enable it for all your users, on all of your systems, all of the time. Learn how to successfully roll out and support MFA in your organization.
Read more
How to implement Multi-Factor Authentication (MFA)
Featured image for Rethinking cyber scenarios—learning (and training) as you defend
January 14, 2020
• 5 min read
Rethinking cyber scenarios—learning (and training) as you defend
Gamified cybersecurity learning is an increasingly important must-have in your SecOps program, from understanding basic concepts all the way into advanced attacker and defense scenarios. Microsoft and Circadence are working together to democratize and scale cyber readiness globally.
Read more
Rethinking cyber scenarios—learning (and training) as you defend
Featured image for CISO Series: Lessons learned from the Microsoft SOC—Part 2a: Organizing people
April 23, 2019
• 7 min read
CISO Series: Lessons learned from the Microsoft SOC—Part 2a: Organizing people
In the second of our three-part series, we focus on the most valuable resource in the SOC—our people.
Read more
CISO Series: Lessons learned from the Microsoft SOC—Part 2a: Organizing people
Featured image for CISO Series: Lessons learned from the Microsoft SOC—Part 1: Organization
February 21, 2019
• 7 min read
CISO Series: Lessons learned from the Microsoft SOC—Part 1: Organization
In the first of our three part series, we provide tips on how to manage a security operations center (SOC) to be more responsive, effective, and collaborative.
Read more
CISO Series: Lessons learned from the Microsoft SOC—Part 1: Organization
Featured image for CISO series: Talking cybersecurity with the board of directors
January 31, 2019
• 3 min read
CISO series: Talking cybersecurity with the board of directors
To maintain a board’s confidence, you need to engage them in your strategy early and often.
Read more
CISO series: Talking cybersecurity with the board of directors
1
2
Next Page