Skip to main content
Skip to main content
Microsoft
Microsoft Security
Microsoft Security
Microsoft Security
Home
Solutions
Cloud security
Frontline workers
Identity & access
Industrial & critical infrastructure
Information protection & governance
IoT security
Passwordless authentication
Phishing
Ransomware
Risk management
Secure remote work
SIEM & XDR
Small & medium business
Zero Trust
Products
Product families
Product families
Microsoft Defender
Microsoft Entra
Microsoft Intune
Microsoft Priva
Microsoft Purview
Microsoft Sentinel
Identity & access
Identity & access
Azure Active Directory part of Microsoft Entra
Microsoft Entra Identity Governance
Microsoft Entra Permissions Management
Microsoft Entra Verified ID
Microsoft Entra Workload Identities
Azure Key Vault
SIEM & XDR
SIEM & XDR
Microsoft Sentinel
Microsoft Defender for Cloud
Microsoft 365 Defender
Microsoft Defender for Endpoint
Microsoft Defender for Office 365
Microsoft Defender for Identity
Microsoft Defender for Cloud Apps
Microsoft Defender Vulnerability Management
Microsoft Defender Threat Intelligence
Cloud security
Cloud security
Microsoft Defender for Cloud
Microsoft Defender Cloud Security Posture Mgmt
Microsoft Defender for DevOps
Microsoft Defender External Attack Surface Management
Azure Firewall
Azure Web App Firewall
Azure DDoS Protection
GitHub Advanced Security
Endpoint security
Endpoint security
Microsoft 365 Defender
Microsoft Defender for Endpoint
Microsoft Defender for IoT
Microsoft Defender for Business
Microsoft Defender Vulnerability Management
Risk management & privacy
Risk management & privacy
Microsoft Purview Insider Risk Management
Microsoft Purview Communication Compliance
Microsoft Purview eDiscovery
Microsoft Purview Compliance Manager
Microsoft Purview Audit
Microsoft Priva Risk Management
Microsoft Priva Subject Rights Requests
Information protection
Information protection
Microsoft Purview Information Protection
Microsoft Purview Data Lifecycle Management
Microsoft Purview Data Loss Prevention
Endpoint management
Endpoint management
Microsoft Intune Core
Services
Microsoft Security Experts
Microsoft Defender Experts for Hunting
Microsoft Security Services for Enterprise
Microsoft Security Services for Incident Response
Microsoft Security Services for Modernization
Partners
Resources
Get started
Get started
Cybersecurity awareness
Customer stories
Security 101
Product trials
How we protect Microsoft
Reports and analysis
Reports and analysis
Industry recognition
Microsoft Security Insider
Microsoft Digital Defense Report
Security Response Center
Community
Community
Microsoft Security Blog
Microsoft Security Events
Microsoft Tech Community
Documentation and training
Documentation and training
Documentation
Technical Content Library
Training & certifications
Cyberattack support
Cyberattack support
Under attack?
Additional sites
Additional sites
Compliance Program for Microsoft Cloud
Microsoft Trust Center
Security Engineering Portal
Service Trust Portal
Contact Sales
More
Start free trial
All Microsoft
Global
Microsoft Security
Azure
Dynamics 365
Microsoft 365
Microsoft Teams
Windows 365
Tech & innovation
Tech & innovation
Microsoft Cloud
AI
Azure Space
Mixed reality
Microsoft HoloLens
Microsoft Viva
Quantum computing
Sustainability
Industries
Industries
Education
Automotive
Financial services
Government
Healthcare
Manufacturing
Retail
All industries
Partners
Partners
Find a partner
Become a partner
Partner Network
Find an advertising partner
Become an advertising partner
Azure Marketplace
AppSource
Resources
Resources
Blog
Microsoft Advertising
Developer Center
Documentation
Events
Licensing
Microsoft Learn
Microsoft Research
View Sitemap
Search
Search Microsoft Security
No results
Cancel
Sign in
Author: Diana Kelley
Cybersecurity Field CTO
Featured image for CISO Stressbusters: 4 tips for running a highly effective security operation
August 4, 2020
• 4 min read
CISO Stressbusters: 4 tips for running a highly effective security operation
CISO Stressbusters provides peer to peer guidance and support on how to alleviate stressful situations in the SOC and on the team.
Read more
CISO Stressbusters: 4 tips for running a highly effective security operation
Featured image for Hello open source security! Managing risk with software composition analysis
July 20, 2020
• 4 min read
Hello open source security! Managing risk with software composition analysis
Software composition analysis guides the selection and management of open source components to help you reduce your security risk.
Read more
Hello open source security! Managing risk with software composition analysis
Featured image for CISO Stressbusters: 3 ways to share accountability for security risk management
July 15, 2020
• 3 min read
CISO Stressbusters: 3 ways to share accountability for security risk management
CISO Stressbusters: CISO guidance and support from around the world.
Read more
CISO Stressbusters: 3 ways to share accountability for security risk management
Featured image for The psychology of social engineering—the “soft” side of cybercrime
June 30, 2020
• 6 min read
The psychology of social engineering—the “soft” side of cybercrime
Build a phishing resistant culture with Cialdini’s 6 Principles of Persuasion .
Read more
The psychology of social engineering—the “soft” side of cybercrime
Featured image for CISO Stressbusters: 4 tips for getting the first 6 months right as a new CISO
June 23, 2020
• 4 min read
CISO Stressbusters: 4 tips for getting the first 6 months right as a new CISO
CISO Stressbusters: CISO guidance and support from around the world.
Read more
CISO Stressbusters: 4 tips for getting the first 6 months right as a new CISO
Featured image for Modernizing the security operations center to better secure a remote workforce
June 22, 2020
• 5 min read
Modernizing the security operations center to better secure a remote workforce
The modern SOC will use machine learning to help humans protect organizations in a multi-cloud, IoT world.
Read more
Modernizing the security operations center to better secure a remote workforce
Featured image for Build support for open source in your organization
May 21, 2020
• 5 min read
Build support for open source in your organization
5 questions that will help you select open source software and 4 recommendations to smooth the internal approval process. Advice from the RSA 2020 panel discussion, Open Source: Promise, Perils and the Path Ahead.
Read more
Build support for open source in your organization
Featured image for CISO stress-busters: post #1 overcoming obstacles
May 11, 2020
• 5 min read
CISO stress-busters: post #1 overcoming obstacles
CISO guidance and support from around the world.
Read more
CISO stress-busters: post #1 overcoming obstacles
Featured image for Protecting your organization against password spray attacks
April 23, 2020
• 4 min read
Protecting your organization against password spray attacks
If your users sign in with guessable passwords, you may be at risk of a password spray attack.
Read more
Protecting your organization against password spray attacks
Featured image for Turning collaboration and customer engagement up with a strong identity approach
April 6, 2020
• 3 min read
Turning collaboration and customer engagement up with a strong identity approach
Balancing friction-less collaboration and highly targeted engagement with privacy and security is not easy, but you don’t have to go it alone.
Read more
Turning collaboration and customer engagement up with a strong identity approach
1
2
3
4
Next Page