Security management
Learn how our identity-driven security solutions protect people, devices, and data from potential vulnerabilities at every touchpoint, everywhere they work.
Refine results
Topic
Products and services
Publish date
-
A few weeks back I had the opportunity to I speak at the Cloud Security Alliance Summit 2016 held in San Francisco, California.
-
What’s Next for EU Cybersecurity after the NIS Agreement?
After three years of intense negotiations, the EU finally reached agreement on the Network and Information Security (NIS) Directive this past December. -
New Microsoft Enterprise Cybersecurity Group to Provide Greater Security Capabilities
We’ve worked hard to earn our customers’ trust when it comes to making their data more secure and we recently announced some significant advances in this area. -
Governments recognize the importance of TPM 2.0 through ISO adoption
Earlier today, the Trusted Computing Group (TCG) announced in a press release the Trusted Platform Module (TPM) 2. -
How do digital youth of the “app generation” learn, communicate, and express themselves
I recently had the opportunity to speak with Katie Davis, an assistant professor from the University of Washington Information School to discuss her role and a book she co-authored called, The App Generation: How Today’s Youth Navigate Identity, Intimacy, and Imagination in a Digital World. -
Measure Twice, Cut Once, With RMA Methodology
I’ve been beating our drum for a while now about the inevitability of failure in cloud-based systems. -
Microsoft is building a global online safety community, one tweet at a time
Some say, “It takes a village to raise a child. -
Reliability Series #1: Reliability vs. resilience
Whenever I speak to customers and partners about reliability I’m reminded that while objectives and priorities differ between organizations and customers, at the end of the day, everyone wants their service to work. -
How do I know if I already have antivirus software?
If your computer is running Windows 8, you already have antivirus software. -
Enterprise Threat Encounters: Scenarios and Recommendations – Part 1
Many of the IT Professionals that contact our customer service and support group have common questions related to security incidents and are seeking guidance on how to mitigate threats from determined adversaries.
-
Can I use Microsoft Security Essentials with Windows 8?
A reader writes: Can I use Microsoft Security Essentials with Windows 8? No—but you don’t need to. -
What is a Microsoft account?
A Microsoft account (formerly known as a Windows Live ID) is a single email address and password you use to sign in to various Microsoft products and services.