Skip to main content
Skip to main content
Microsoft Security

Lessons learned from the Microsoft SOC—Part 3d: Zen and the art of threat hunting

Read more Lessons learned from the Microsoft SOC—Part 3d: Zen and the art of threat hunting

Defending the power grid against supply chain attacks: Part 3 – Risk management strategies for the utilities industry

Read more Defending the power grid against supply chain attacks: Part 3 – Risk management strategies for the utilities industry

MITRE ATT&CK APT 29 evaluation proves Microsoft Threat Protection provides deeper end to end view of advanced threats

Read more MITRE ATT&CK APT 29 evaluation proves Microsoft Threat Protection provides deeper end to end view of advanced threats

The evolution of Microsoft Threat Protection—July update

Read more The evolution of Microsoft Threat Protection—July update

The evolution of Microsoft Threat Protection, June update

Read more The evolution of Microsoft Threat Protection, June update

Executing on the vision of Microsoft Threat Protection

Read more Executing on the vision of Microsoft Threat Protection

The evolution of Microsoft Threat Protection, April update

Read more The evolution of Microsoft Threat Protection, April update

The evolution of Microsoft Threat Protection, RSA edition part 2

Read more The evolution of Microsoft Threat Protection, RSA edition part 2

The evolution of Microsoft Threat Protection, RSA edition part 1

Read more The evolution of Microsoft Threat Protection, RSA edition part 1

The evolution of Microsoft Threat Protection, February update

Read more The evolution of Microsoft Threat Protection, February update