How to help maintain security compliance
This is the last post in our eight-blog series on deploying Intelligent Security scenarios. In this post, we explain how Microsoft 365 security solutions enable you to manage security compliance processes.
This is the last post in our eight-blog series on deploying Intelligent Security scenarios. In this post, we explain how Microsoft 365 security solutions enable you to manage security compliance processes.
We added new capabilities to each of the pillars of Windows Defender ATP’s unified endpoint protection platform: improved attack surface reduction, better-than-ever next-gen protection, more powerful post-breach detection and response, enhanced automation capabilities, more security insights, and expanded threat hunting.
Shawn Anderson, a former CISO, now meets with CISOs every other week to answer their questions on moving to the cloud and where to start. Today, Shawn shows you how you can use the Azure enterprise scaffold to migrate to the cloud—even in a hybrid-cloud environment.
This post is part of our blog series on deploying Intelligent Security scenarios. Learn how Microsoft 365 security solutions enable your users to securely share documents outside your organization and how to work on documents across devices more securely.
In my last blog, we looked at five communication techniques that can help engage business managers in the work of cybersecurity. This week, we’ll look at how to use those techniques to bring the C-Suite into the conversation.
There is tremendous opportunity to use AI—particularly machine learning—to improve the efficacy of cybersecurity, the detection of hackers, and even prevent attacks before they occur.
Duo Security, Fortinet, Trusona, Yubico, and Contrast Security have joined the Microsoft Intelligent Security Association.
Keeping track of sensitive data is becoming harder as data is being dispersed all over the organization. Protecting your data begins with understanding that P = NP (read: Production equals Non-Production).
This post is authored by Michael Bargury, Data Scientist, C+E Security. The need The cloud introduces new security challenges, which differ from classic ones by diversity and scale. Once a Virtual Machine (VM) is up and running with an open internet port, it is almost instantaneously subject to vulnerability scanning and Brute Force (BF) attacks.
This post is authored by Cyril Voisin, Chief Security Advisor, Enterprise Cybersecurity Group. Nowadays every company is becoming a digital company to some extent. Digital transformation changes the way business is done.