Zero Trust
Todayโs organizations need a security model that more effectively adapts to the complexity of the modern environment, embraces the hybrid workplace, and protects people, devices, apps, and data wherever theyโre located. Stay up to date on the latest strategies, insights, and solutions built on Zero Trust principles.
Refine results
Topic
Products and services
Publish date
-
The recent SolarWinds attack is a moment of reckoning. -
Why threat protection is critical to your Zero Trust security strategy
The corporate network perimeter has been completely redefined. -
Why operational resilience will be key in 2021, and how this impacts cybersecurity
The lessons we have learned during the past 12 months have demonstrated that the ability to respond to, and bounce back from adversity in general, can impact the short-and long-term success of any organization. -
5 identity priorities for 2021—strengthening security for the hybrid work era and beyond
When I outlined the five identity priorities for 2020, the world was a very different place. -
Microsoft surpasses $10 billion in security business revenue, more than 40 percent year-over-year growth
Microsoft empowers defenders to secure across platforms and clouds to make the world a safer place. -
How companies are securing devices with Zero Trust practices
Organizations are seeing a substantial increase in the diversity of devices accessing their networks. -
Using Zero Trust principles to protect against sophisticated attacks like Solorigate
The Solorigate supply chain attack has captured the focus of the world over the last month. -
How IT leaders are securing identities with Zero Trust
The past twelve months have been a remarkable time of digital transformation as organizations, and especially digital security teams, adapt to working remotely and shifting business operations. -
Increasing resilience against Solorigate and other sophisticated attacks with Microsoft Defender
This blog is a guide for security administrators using Microsoft 365 Defender and Azure Defender to identify and implement security configuration and posture improvements that harden enterprise environments against Solorigate’s attack patterns. -
A breakthrough year for passwordless technology
Learn how Microsoft and its partners are advancing IAM through secure passwordless access. -
Building a Zero Trust business plan
These past six months have been a remarkable time of transformation for many IT organizations. -
Deliver productive and seamless user experiences with Azure Active Directory
Learn how identity has become the new security perimeter and how an identity-based framework reduces risk and improves productivity.