Incident response
Incident response is the process of detecting, investigating, and responding to cyberattacks, security breaches, or IT incidents. Explore the latest trends and intelligence-driven strategies that help you prevent future attacks.
Refine results
Topic
Products and services
Publish date
-
This post is authored by Steven Meyers, security operations principal, Microsoft Cyber Defense Operations Center. -
Windows Defender ATP Fall Creators Update
UPDATE: For the latest information on Windows Defender ATP features and capabilities, read the blog post What’s new in Windows Defender ATP. -
Windows 10 Creators Update provides next-gen ransomware protection
Multiple high-profile incidents have demonstrated that ransomware can have catastrophic effects on all of us. -
Singapore: Realizing that for the future to be smart, it needs to be secure
In 2005, just over a decade ago, the majority of large internet user populations, certainly as a percentage of their total national population, were still to be found in North America and Europe. -
The two-pronged approach to detecting persistent adversaries
Advanced Persistent Threats use two primary methods of persistence: compromised endpoints and compromised credentials. -
World Backup Day is as good as any to back up your data
In today’s security landscape, there are more threats to data than ever before. -
Microsoft’s Cyber Defense Operations Center shares best practices
This post is authored by a Security Principal of Cyber Security Services and Engineering Each week seems to bring a new disclosure of a cybersecurity breach somewhere in the world. -
Microsoft Enterprise Threat Detection
This post is authored by Joe Faulhaber, Senior Consultant ECG Overview The Microsoft Enterprise Cybersecurity Group (ECG) consists of three pillars: Protect, Detect, and Respond. -
Disrupting the kill chain
This post is authored by Jonathan Trull, Worldwide Executive Cybersecurity Advisor, Enterprise Cybersecurity Group. -
Global cybersecurity policy: Finding a balance between security and competitiveness
Over the past decade, billions around the world have benefited from the exponential growth of the online environment and associated economic opportunities. -
What’s The Art of War got to do with cybercrime? Quite a bit, actually.
Sun Tzu wrote that mastery in the art of war is about subduing one’s enemy without having to fight. -
What’s Next for EU Cybersecurity after the NIS Agreement?
After three years of intense negotiations, the EU finally reached agreement on the Network and Information Security (NIS) Directive this past December.