Security management
Learn how our identity-driven security solutions protect people, devices, and data from potential vulnerabilities at every touchpoint, everywhere they work.
Refine results
Topic
Products and services
Publish date
-
End-to-end security is a modern, comprehensive approach to data protection that aligns data protection and incident response across devices, systems, and users. -
Cybersecurity Awareness Month: Securing our world—together
To help our global cyberdefenders, Microsoft has put together the Be Cybersmart Kit, designed to educate everyone, on best practices for going passwordless, not falling for sophisticated phishing or fraud, device protection, AI safety, and more. -
Microsoft’s guidance to help mitigate Kerberoasting
Kerberoasting, a well-known Active Directory (AD) attack vector, enables threat actors to steal credentials and navigate through devices and networks. -
Zero Trust Workshop: Advance your knowledge with an online resource
As part of Microsoft’s ongoing efforts to support security modernization and the Zero Trust principles, we’ve launched Zero Trust Workshop, an online self-service resource. -
DoD Zero Trust Strategy proves security benchmark years ahead of schedule with Microsoft collaboration
The Navy implementation scored a 100 percent success rate, meeting DoD requirements on all 91 Target-Level activities tested. -
AI innovations for a more secure future unveiled at Microsoft Ignite
Company delivers advances in AI and posture management, unprecedented bug bounty program, and updates on its Secure Future Initiative. -
Foundry study highlights the benefits of a unified security platform in new e-book
Microsoft commissioned Foundry to conduct a study to understand the current state of threat protection. -
Why security teams rely on Microsoft Defender Experts for XDR for managed detection and response
Microsoft Defender Experts for XDR is a mature and proven service that triages, investigates, and responds to incidents and hunts for threats on a customer’s behalf around the clock. -
3 takeaways from red teaming 100 generative AI products
Since 2018, Microsoft’s AI Red Team has probed generative AI products for critical safety and security vulnerabilities. -
3 priorities for adopting proactive identity and access security in 2025
Adopting proactive defensive measures is the only way to get ahead of determined efforts to compromise identities and gain access to your environment. -
Hear from Microsoft Security experts at these top cybersecurity events in 2025
Security events offer a valuable opportunity to learn about the latest trends and solutions, evolve your skills for cyberthreats, and meet like-minded security professionals. -
Women’s History Month: Why different perspectives in cybersecurity and AI matter more than ever before
This Women’s History Month serves as a crucial moment for us to lead and continue to pave the way for a more inclusive future.