Microsoft Security Experts
Our expertise is now your expertise. Learn how to extend your ability to defend and manage with a new line of services from the experts at Microsoft.
Refine results
Topic
Products and services
Publish date
-
The latest round of MITRE ATT&CK evaluations proved yet again that Microsoft customers can trust they are fully protected even in the face of such an advanced attack as APT29. -
Threat hunting: Part 1—Why your SOC needs a proactive hunting team
A threat hunting team can help you defend against stealth attackers. -
Experts on demand: Your direct line to Microsoft security insight, guidance, and expertise
Experts on demand is now generally available and gives customers direct access to real-life Microsoft threat analysts to help with their security investigations. -
Gartner names Microsoft a Leader in 2019 Endpoint Protection Platforms Magic Quadrant
Gartner named Microsoft a Leader in the 2019 Gartner Magic Quadrant for Endpoint Protection Platforms, positioned highest in execution. -
Announcing Microsoft Defender ATP for Mac and new Threat and Vulnerability Management capabilities
Today at Ignite Amsterdam, we’re excited to announce two additions to our endpoint security platform. -
Helping security professionals do more, better
Learn how Microsoft’s latest security product releases and solutions showcased at RSA are helping security professionals do more, better. -
Tips for protecting your information and privacy against cybersecurity threats
This post is authored by Steven Meyers, security operations principal, Microsoft Cyber Defense Operations Center. -
Singapore: Realizing that for the future to be smart, it needs to be secure
In 2005, just over a decade ago, the majority of large internet user populations, certainly as a percentage of their total national population, were still to be found in North America and Europe. -
The two-pronged approach to detecting persistent adversaries
Advanced Persistent Threats use two primary methods of persistence: compromised endpoints and compromised credentials. -
Microsoft’s Cyber Defense Operations Center shares best practices
This post is authored by a Security Principal of Cyber Security Services and Engineering Each week seems to bring a new disclosure of a cybersecurity breach somewhere in the world. -
Microsoft Enterprise Threat Detection
This post is authored by Joe Faulhaber, Senior Consultant ECG Overview The Microsoft Enterprise Cybersecurity Group (ECG) consists of three pillars: Protect, Detect, and Respond. -
Disrupting the kill chain
This post is authored by Jonathan Trull, Worldwide Executive Cybersecurity Advisor, Enterprise Cybersecurity Group.