Security operations
Explore the latest insights, tools, frameworks, and developments in security operations (SecOps).
Refine results
Topic
Products and services
Publish date
-
The word strategy has its origins in the Roman Empire and was used to describe the leading of troops in battle. -
Overview of Petya, a rapid cyberattack
In the first blog post of this 3-part series, we introduced what rapid cyberattacks are and illustrated how they are different in terms of execution and outcome. -
Hardening the system and maintaining integrity with Windows Defender System Guard
Just a few weeks ago at Ignite we announced Windows Defender System Guard, which ships in Windows 10, version 1709, also known as the Fall Creators Update. -
Stepping up protection with intelligent security
With digital transformation, technology becomes increasingly central to every business and organization. -
New IIS functionality to help identify weak TLS usage
IIS logs can already be used to correlate client IP address, user agent string, and service URI. -
Top 5 best practices to automate security operations
This post is authored by Jonathan Trull, Worldwide Executive Cybersecurity Advisor, Enterprise Cybersecurity Group. -
5 Reasons why Microsoft should be your cybersecurity ally
When you think about cybersecurity, does Microsoft come to mind? Probably not. -
Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security
On April 14, a group calling themselves the Shadow Brokers caught the attention of the security community by releasing a set of weaponized exploits. -
Confidence building measures can make a huge difference to the global online economy
The continuing advancements of the Internet and associated technologies have brought new opportunities to governments, businesses, and private citizens. -
Microsoft’s Cyber Defense Operations Center shares best practices
This post is authored by a Security Principal of Cyber Security Services and Engineering Each week seems to bring a new disclosure of a cybersecurity breach somewhere in the world. -
Use Security Education and Awareness Programs to Your Advantage
This post is authored by Jonathan C. Trull, Worldwide Executive Cybersecurity Advisor, Enterprise Cybersecurity Group Most of today’s media coverage, internal security budgets, and venture capital dollars are focused on new and exciting technologies, such as next-generation endpoint solutions, user behavior analytics, and others. -
Top Five Security Threats Facing Your Business and How to Respond
This post was authored by Ann Johnson, Vice-President, Enterprise Cybersecurity Group Headlines highlighting how vulnerable we are to cyber threats are now all too commonplace.