-
-
Microsoft Purview data security mitigations for BazaCall and other human-operated data exfiltration attacks
Microsoft Defender is our toolset for prevention and mitigation of data exfiltration and ransomware attacks. Microsoft Purview data security offers important mitigations as well and should be used as part of a defense-in-depth strategy. -
Boost identity protection with Axiad Cloud and Microsoft Entra ID
As IT environments become more complex and multilayered to combat cybersecurity attacks, authentication processes for applications, operating systems, and workplace locations are increasingly managed in silos. Axiad Cloud and Microsoft Entra ID help to strengthen security perimeters by provisioning and managing phishing-resistant, passwordless credentials. -
Adopting guidance from the US National Cybersecurity Strategy to secure the Internet of Things
Microsoft is invested in helping partners create Internet of Things solutions with strong security products that support the March 2023 United States National Cybersecurity Strategy. -
How to build stronger security teams
Jayson Street of Truesec talks about security awareness training and building a foundation of cybersecurity. -
Microsoft Defender Experts for XDR helps triage, investigate, and respond to cyberthreats
Take a closer look at how Microsoft Defender Experts for XDR works, and how it complements the power of the Microsoft 365 Defender suite. -
11 best practices for securing data in cloud services
This blog explores the importance and best practices for securing data in the cloud. It discusses concepts such as authentication, zero trust, and encryption, among others. -
Patch me if you can: Cyberattack Series
The Microsoft Incident Response team takes swift action to help contain a ransomware attack and regain positive administrative control of the customer environment. -
How automation is evolving SecOps—and the real cost of cybercrime
ramsac Founder and Managing Director Rob May shares insights on how automation can support SecOps and how to protect against phishing attacks. -
Why endpoint management is key to securing an AI-powered future
With the coming wave of AI, this is precisely the time for organizations to prepare for the future. To be properly ready for AI, Zero Trust principles take on new meaning and scope. The right endpoint management strategy can help provide the broadest signal possible and make your organization more secure and productive for years to come.