Security operations
Explore the latest insights, tools, frameworks, and developments in security operations (SecOps).
Refine results
Topic
Products and services
Publish date
-
To maintain a board’s confidence, you need to engage them in your strategy early and often. -
Voice of the Customer: The Walsh Group found that Azure Active Directory gives them a competitive edge
The Voice of the Customer blog series is designed to help you by sharing stories from real customers who are solving their identity and security challenges using Azure AD. -
Kicking off the Microsoft Graph Security Hackathon
Announcing the Microsoft Graph Security Hackathon! Join today for a chance to win a piece of the $15,000 cash prize pool. -
CISO series: Secure your privileged administrative accounts with a phased roadmap
If you are working on initiatives to secure your privileged accounts (and I hope you are), this post is designed to help. -
CISO series: Build in security from the ground up with Azure enterprise
Shawn Anderson, a former CISO, now meets with CISOs every other week to answer their questions on moving to the cloud and where to start. -
CISO series: Building a security-minded culture starts with talking to business managers
Protecting the company and its users against data leaks is no longer just the responsibility of IT and security operations. -
How Office 365 learned to reel in phish
Find out how Office 365 learned to mitigate phishing attacks. -
Making it real—harnessing data gravity to build the next gen SOC
In this post we address the question: “How do we make data gravity a reality in the security operations center (SOC) while we are under increased and constant pressure from motivated threat actors?” -
Delivering security innovation that puts Microsoft’s experience to work for you
Cybersecurity is the central challenge of our digital age. -
Get deeper into security at Microsoft Ignite 2018
This year at Ignite, Microsoft announces exciting innovations in identity management, information protection, threat protection, security management, and more. -
Building the security operations center of tomorrow—harnessing the law of data gravity
How can we build the SOC of tomorrow? By respecting the law of data gravity. -
Cybersecurity threats: How to discover, remediate, and mitigate
This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions.