A new vulnerability, which we refer to as “Migraine”, could allow an attacker with root access to bypass System Integrity Protection (SIP) in macOS and perform arbitrary operations on a device.
Business email operators seek to exploit the daily sea of email traffic to lure victims into providing financial and other sensitive business information.
At RSA Conference April 24 to 26, 2023, Microsoft Security shared solution news and insights. Watch Vasu Jakkal’s keynote on-demand (video courtesy of RSA conference).
Learn how guessing, replay, phishing, and multifactor authentication fatigue attacks demonstrate the ongoing vulnerability of passwords, and why going passwordless makes your organization more secure while improving user experience.
Tanya Janca, Founder and Chief Executive Officer of We Hack Purple, shares insights on application security and offers strategies to protect against data loss from ransomware attacks.
This is the second in an ongoing series exploring some of the most notable cases of the Microsoft Incident Response Team. In this story, we’ll explore how organizations can adopt a defense-in-depth security posture to help protect against credential breaches and ransomware attacks.
At the fourth annual Microsoft Security Excellence Awards, we recognized outstanding contributions from Microsoft Intelligent Security Association (MISA) members and celebrated the next generation of security defenders. See all the finalists and winners.
Learn how Cloud Data Management Capabilities (CDMC) certification can build trust with your customers and provide a standard for data governance and controls for managing sensitive data at scale.
Learn why Microsoft Entra delivers 240-percent ROI—get key benefits and real-world learnings from adopters across the financial, high-tech, and manufacturing sectors.
Do you feel like your endpoint management set-up is too complex? This step-by-step guide will help you create a vision and set you on the path to simpler endpoint management.