Building the security operations center of tomorrow—better insights with compound detection
Learn how compound detection can help you apply the law of data gravity and correlate insights across your security platforms.
Learn how compound detection can help you apply the law of data gravity and correlate insights across your security platforms.
“Not another portal, not another password!” —Learn how lululemon implemented Azure AD for cloud Identity and Access Management, simplifying user access without reducing business flexibility.
Learn about the top feature updates for Microsoft Threat Protection in January.
How the U.S. insurance industry is aligning behind a cybersecurity framework in a fragmented, state-by-state, regulatory environment.
Insights into how the security community is working to secure IoT devices today, and how AI will enhance those efforts over time.
Last month, we shared updates on capabilities for securing identities, endpoints, user data, and cloud apps. This month, we provide an update for Azure Security Center which secures organizations from threats across hybrid cloud workloads.
Cybersecurity hygiene is about maintaining cyberhealth by developing and implementing a set of tools, policies, and practices to increase your organization’s resiliency in the face of attacks and exploits.
This is the last post in our eight-blog series on deploying Intelligent Security scenarios. In this post, we explain how Microsoft 365 security solutions enable you to manage security compliance processes.
Learn about the latest enhancements to Microsoft Threat Protection, the premier solution for securing the modern workplace across identities, endpoints, user data, apps, and infrastructure.
This post is part of our blog series on deploying Intelligent Security scenarios. Learn how Microsoft 365 security solutions enable your users to securely share documents outside your organization and how to work on documents across devices more securely.