{"id":15792,"date":"2024-07-17T16:46:19","date_gmt":"2024-07-17T23:46:19","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?page_id=15792"},"modified":"2026-03-02T10:39:13","modified_gmt":"2026-03-02T18:39:13","slug":"security-3","status":"publish","type":"page","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/security-3\/","title":{"rendered":"Security and Risk Management"},"content":{"rendered":"\n<div class=\"wp-block-cover alignfull cover-hero has-white-color has-text-color has-link-color has-body-lg-font-size wp-elements-d20b2837a2b093f74a3b4b0a887ea3dd has-aspect-ratio\" style=\"margin-top:0;margin-bottom:0;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0;min-height:360px;aspect-ratio:16\/9;min-height:unset;\"><img loading=\"lazy\" decoding=\"async\" width=\"2120\" height=\"795\" class=\"wp-block-cover__image-background wp-image-15897\" alt=\"Outside of a conference room or board room meeting including people sitting around table in a room with international time clocks.\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/07\/RW1itI7.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/07\/RW1itI7.jpg 2120w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/07\/RW1itI7-300x113.jpg 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/07\/RW1itI7-1024x384.jpg 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/07\/RW1itI7-768x288.jpg 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/07\/RW1itI7-1536x576.jpg 1536w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/07\/RW1itI7-2048x768.jpg 2048w\" sizes=\"auto, (max-width: 2120px) 100vw, 2120px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim wp-block-cover__gradient-background has-background-gradient has-black-to-transparent-gradient-background\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-container-core-cover-is-layout-e603688c wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-e9d5792b wp-block-group-is-layout-constrained\">\n<h1 class=\"wp-block-heading h2 has-h-2-font-size\" style=\"font-weight:700\">Security and Risk Management<\/h1>\n\n\n\n<p class=\"has-text-align-left wp-block-paragraph\">Information security solutions are more important than ever in today\u2019s digital-first tech world.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<p class=\"wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-48);padding-top:var(--wp--preset--spacing--spacing-24)\">At Microsoft, our identity-driven security solutions protect users, devices, and data from potential vulnerabilities at every touchpoint, everywhere they work. Artificial intelligence and machine learning help us automate mundane security tasks, and complex product integrations improve our threat detection and remediation efforts. Learn how Microsoft Digital supports our global workforce and secures valuable company and customer data.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-h-3-font-size\" style=\"margin-top:var(--wp--preset--spacing--spacing-48);font-style:normal;font-weight:700\">Featured<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex has-2-columns\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<article class=\"wp-block-post post-9344 post type-post status-publish format-standard has-post-thumbnail hentry category-it-strategy category-post-format-video tag-change-management tag-end-user-services-and-support tag-microsoft-azure tag-network-and-infrastructure tag-network-security tag-security-and-risk-management tag-zero-trust program-microsoft-digital-technical-stories m-blog-post is-entire-card-clickable cta-card wp-block-tenup-post-picker\">\n\t\n\n<div data-bi-tN=\"Post card: Implementing a Zero Trust security model at Microsoft\" class=\"wp-block-group has-base-background-color has-background has-link-color wp-elements-739295fea53046667c8da0a1e1549b53 is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-69c550ab wp-block-group-is-layout-flex wp-block-null\"><figure style=\"aspect-ratio:16\/9;width:100%;\" class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2300\" height=\"1293\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/04\/10736_hero_image.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"border-top-left-radius:6px;border-top-right-radius:6px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/04\/10736_hero_image.jpg 2300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/04\/10736_hero_image-300x169.jpg 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/04\/10736_hero_image-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/04\/10736_hero_image-768x432.jpg 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/04\/10736_hero_image-1536x863.jpg 1536w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/04\/10736_hero_image-2048x1151.jpg 2048w\" sizes=\"auto, (max-width: 2300px) 100vw, 2300px\" \/><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group has-base-background-color has-background is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-5e10c0d5 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--s);padding-right:var(--wp--preset--spacing--s);padding-bottom:var(--wp--preset--spacing--s);padding-left:var(--wp--preset--spacing--s)\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-e464412c wp-block-group-is-layout-flex\"><div style=\"font-style:normal;font-weight:700; padding-top:var(--wp--preset--spacing--spacing-4);padding-bottom:var(--wp--preset--spacing--spacing-4);padding-left:var(--wp--preset--spacing--spacing-16);padding-right:var(--wp--preset--spacing--spacing-16);margin-top:var(--wp--preset--spacing--spacing-12);margin-bottom:var(--wp--preset--spacing--spacing-4);\" class=\"has-link-color wp-elements-ac64562209d7a03a13db290d65f7f882 wp-block-post-date has-text-color has-black-color has-background has-gray-400-background-color has-body-md-font-size\"><time datetime=\"2025-04-24T11:30:00-07:00\">April 24, 2025<\/time><\/div><\/div>\n\n\n<h3 style=\"font-style:normal;font-weight:700;text-decoration:none; padding-bottom:var(--wp--preset--spacing--spacing-2);\" class=\"wp-block-post-title has-h-5-font-size\"><a data-bi-cN=\"Read blog: Implementing a Zero Trust security model at Microsoft\" data-bi-id=\"9344\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/implementing-a-zero-trust-security-model-at-microsoft\/\" target=\"_self\" >Implementing a Zero Trust security model at Microsoft<\/a><\/h3>\n\n\n<p class=\"wp-block-paragraph\">Learn about the challenges and milestones in our journey toward a Zero Trust security model at Microsoft.<\/p>\n\n\n<a aria-label=\"Read blog: Implementing a Zero Trust security model at Microsoft\" data-bi-cN=\"Read blog: Implementing a Zero Trust security model at Microsoft\" data-bi-id=\"9344\" class=\"is-style-read-more-arrow wp-block-read-more\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/implementing-a-zero-trust-security-model-at-microsoft\/\" target=\"_self\">Watch Video<span class=\"screen-reader-text\">: Implementing a Zero Trust security model at Microsoft<\/span><\/a><\/div>\n<\/div>\n<\/div>\n\n<\/article>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<article class=\"wp-block-post post-20811 post type-post status-publish format-standard has-post-thumbnail hentry category-uncategorized tag-device-management tag-digital-transformation tag-end-user-services-and-support tag-governance tag-microsoft-365 tag-network-security tag-security-and-risk-management tag-tenant-management tag-windows m-blog-post is-entire-card-clickable cta-card wp-block-tenup-post-picker\">\n\t\n\n<div data-bi-tN=\"Post card: Hardening our digital defenses with Microsoft Baseline Security Mode\" class=\"wp-block-group has-base-background-color has-background has-link-color wp-elements-ce27f643e6af15d2ad467106b31038d5 is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-69c550ab wp-block-group-is-layout-flex wp-block-null\"><figure style=\"aspect-ratio:16\/9;width:100%;\" class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2300\" height=\"1293\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/11\/10784_Hero-image.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"border-top-left-radius:6px;border-top-right-radius:6px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/11\/10784_Hero-image.jpg 2300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/11\/10784_Hero-image-300x169.jpg 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/11\/10784_Hero-image-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/11\/10784_Hero-image-768x432.jpg 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/11\/10784_Hero-image-1536x863.jpg 1536w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/11\/10784_Hero-image-2048x1151.jpg 2048w\" sizes=\"auto, (max-width: 2300px) 100vw, 2300px\" \/><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group has-base-background-color has-background is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-5e10c0d5 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--s);padding-right:var(--wp--preset--spacing--s);padding-bottom:var(--wp--preset--spacing--s);padding-left:var(--wp--preset--spacing--s)\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-e464412c wp-block-group-is-layout-flex\"><div style=\"font-style:normal;font-weight:700; padding-top:var(--wp--preset--spacing--spacing-4);padding-bottom:var(--wp--preset--spacing--spacing-4);padding-left:var(--wp--preset--spacing--spacing-16);padding-right:var(--wp--preset--spacing--spacing-16);margin-top:var(--wp--preset--spacing--spacing-12);margin-bottom:var(--wp--preset--spacing--spacing-4);\" class=\"has-link-color wp-elements-ac64562209d7a03a13db290d65f7f882 wp-block-post-date has-text-color has-black-color has-background has-gray-400-background-color has-body-md-font-size\"><time datetime=\"2025-11-18T08:00:00-08:00\">November 18, 2025<\/time><\/div><\/div>\n\n\n<h3 style=\"font-style:normal;font-weight:700;text-decoration:none; padding-bottom:var(--wp--preset--spacing--spacing-2);\" class=\"wp-block-post-title has-h-5-font-size\"><a data-bi-cN=\"Read blog: Hardening our digital defenses with Microsoft Baseline Security Mode\" data-bi-id=\"20811\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/hardening-our-digital-defenses-with-microsoft-baseline-security-mode\/\" target=\"_self\" >Hardening our digital defenses with Microsoft Baseline Security Mode<\/a><\/h3>\n\n\n<p class=\"wp-block-paragraph\">Check out how we\u2019re supporting Zero Trust Networking and our Security First Initiative internally here at Microsoft with wired network security.<\/p>\n\n\n<a aria-label=\"Read blog: Hardening our digital defenses with Microsoft Baseline Security Mode\" data-bi-cN=\"Read blog: Hardening our digital defenses with Microsoft Baseline Security Mode\" data-bi-id=\"20811\" class=\"is-style-read-more-arrow wp-block-read-more\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/hardening-our-digital-defenses-with-microsoft-baseline-security-mode\/\" target=\"_self\">Read Blog<span class=\"screen-reader-text\">: Hardening our digital defenses with Microsoft Baseline Security Mode<\/span><\/a><\/div>\n<\/div>\n<\/div>\n\n<\/article>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:0;margin-bottom:var(--wp--preset--spacing--spacing-32)\">\n<h2 class=\"wp-block-heading has-text-align-left has-h-3-font-size\" style=\"margin-top:var(--wp--preset--spacing--spacing-48);font-style:normal;font-weight:700\">More articles<\/h2>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-right is-layout-flex wp-container-core-buttons-is-layout-d445cf74 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-button-view-all\"><a data-bi-cN=\"Link: View all\"class=\"wp-block-button__link wp-element-button\" href=\"\/insidetrack\/blog\/?s=Security\" style=\"font-weight:700\">View all<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"columns-4 wp-block-post-template has-h-6-font-size is-layout-grid wp-container-core-post-template-is-layout-69fbb3de wp-block-post-template-is-layout-grid is-entire-card-clickable\"><li class=\"wp-block-post post-23173 post type-post status-publish format-standard has-post-thumbnail hentry category-office-of-the-ciso tag-agent tag-ai-deployment-and-adoption tag-cybersecurity tag-microsoft-365 tag-security-and-risk-management tag-zero-trust m-blog-post\">\n\n<div data-bi-tN=\"Post card: Microsoft CISO advice: How to build Trustworthy Agentic AI\" class=\"wp-block-group cta-card has-base-background-color has-background has-link-color wp-elements-63e0dd3f3012c00c158d00f414060934 is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-69c550ab wp-block-group-is-layout-flex wp-block-null\"><figure style=\"aspect-ratio:16\/9;width:100%;\" class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2300\" height=\"1293\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10871-Hero_image.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"border-top-left-radius:6px;border-top-right-radius:6px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10871-Hero_image.jpg 2300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10871-Hero_image-300x169.jpg 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10871-Hero_image-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10871-Hero_image-768x432.jpg 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10871-Hero_image-1536x863.jpg 1536w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10871-Hero_image-2048x1151.jpg 2048w\" sizes=\"auto, (max-width: 2300px) 100vw, 2300px\" \/><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group has-base-background-color has-background is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-5e10c0d5 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--s);padding-right:var(--wp--preset--spacing--s);padding-bottom:var(--wp--preset--spacing--s);padding-left:var(--wp--preset--spacing--s)\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-e464412c wp-block-group-is-layout-flex\"><div style=\"font-style:normal;font-weight:700; padding-top:var(--wp--preset--spacing--spacing-4);padding-bottom:var(--wp--preset--spacing--spacing-4);padding-left:var(--wp--preset--spacing--spacing-16);padding-right:var(--wp--preset--spacing--spacing-16);margin-top:var(--wp--preset--spacing--spacing-12);margin-bottom:var(--wp--preset--spacing--spacing-4);\" class=\"has-link-color wp-elements-ac64562209d7a03a13db290d65f7f882 wp-block-post-date has-text-color has-black-color has-background has-gray-400-background-color has-body-md-font-size\"><time datetime=\"2026-04-16T08:15:00-07:00\">April 16, 2026<\/time><\/div><\/div>\n\n\n<h3 style=\"font-style:normal;font-weight:700;text-decoration:none; padding-bottom:var(--wp--preset--spacing--spacing-2);\" class=\"wp-block-post-title has-h-5-font-size\"><a data-bi-cN=\"Read blog: Microsoft CISO advice: How to build Trustworthy Agentic AI\" data-bi-id=\"23173\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-how-to-build-trustworthy-agentic-ai\/\" target=\"_self\" >Microsoft CISO advice: How to build Trustworthy Agentic AI<\/a><\/h3>\n\n<a aria-label=\"Read blog: Microsoft CISO advice: How to build Trustworthy Agentic AI\" data-bi-cN=\"Read blog: Microsoft CISO advice: How to build Trustworthy Agentic AI\" data-bi-id=\"23173\" class=\"is-style-read-more-arrow wp-block-read-more\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-how-to-build-trustworthy-agentic-ai\/\" target=\"_self\">Read Blog<span class=\"screen-reader-text\">: Microsoft CISO advice: How to build Trustworthy Agentic AI<\/span><\/a><\/div>\n<\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-23016 post type-post status-publish format-standard has-post-thumbnail hentry category-office-of-the-ciso tag-agent tag-ai tag-ai-deployment-and-adoption tag-cybersecurity tag-microsoft-365 tag-security-and-risk-management tag-zero-trust m-blog-post\">\n\n<div data-bi-tN=\"Post card: Microsoft CISO advice: The importance of a written AI safety plan\" class=\"wp-block-group cta-card has-base-background-color has-background has-link-color wp-elements-63e0dd3f3012c00c158d00f414060934 is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-69c550ab wp-block-group-is-layout-flex wp-block-null\"><figure style=\"aspect-ratio:16\/9;width:100%;\" class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2300\" height=\"1293\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10870-Hero_image.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"border-top-left-radius:6px;border-top-right-radius:6px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10870-Hero_image.jpg 2300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10870-Hero_image-300x169.jpg 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10870-Hero_image-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10870-Hero_image-768x432.jpg 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10870-Hero_image-1536x863.jpg 1536w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10870-Hero_image-2048x1151.jpg 2048w\" sizes=\"auto, (max-width: 2300px) 100vw, 2300px\" \/><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group has-base-background-color has-background is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-5e10c0d5 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--s);padding-right:var(--wp--preset--spacing--s);padding-bottom:var(--wp--preset--spacing--s);padding-left:var(--wp--preset--spacing--s)\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-e464412c wp-block-group-is-layout-flex\"><div style=\"font-style:normal;font-weight:700; padding-top:var(--wp--preset--spacing--spacing-4);padding-bottom:var(--wp--preset--spacing--spacing-4);padding-left:var(--wp--preset--spacing--spacing-16);padding-right:var(--wp--preset--spacing--spacing-16);margin-top:var(--wp--preset--spacing--spacing-12);margin-bottom:var(--wp--preset--spacing--spacing-4);\" class=\"has-link-color wp-elements-ac64562209d7a03a13db290d65f7f882 wp-block-post-date has-text-color has-black-color has-background has-gray-400-background-color has-body-md-font-size\"><time datetime=\"2026-04-09T09:00:00-07:00\">April 9, 2026<\/time><\/div><\/div>\n\n\n<h3 style=\"font-style:normal;font-weight:700;text-decoration:none; padding-bottom:var(--wp--preset--spacing--spacing-2);\" class=\"wp-block-post-title has-h-5-font-size\"><a data-bi-cN=\"Read blog: Microsoft CISO advice: The importance of a written AI safety plan\" data-bi-id=\"23016\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-the-importance-of-a-written-ai-safety-plan\/\" target=\"_self\" >Microsoft CISO advice: The importance of a written AI safety plan<\/a><\/h3>\n\n<a aria-label=\"Read blog: Microsoft CISO advice: The importance of a written AI safety plan\" data-bi-cN=\"Read blog: Microsoft CISO advice: The importance of a written AI safety plan\" data-bi-id=\"23016\" class=\"is-style-read-more-arrow wp-block-read-more\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-the-importance-of-a-written-ai-safety-plan\/\" target=\"_self\">Read Blog<span class=\"screen-reader-text\">: Microsoft CISO advice: The importance of a written AI safety plan<\/span><\/a><\/div>\n<\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-23030 post type-post status-publish format-standard has-post-thumbnail hentry category-featured category-it-strategy tag-ai tag-ai-deployment-and-adoption tag-ai-governance tag-data-and-ai tag-device-management tag-end-user-services-and-support tag-enterprise-data tag-governance tag-it-and-business-operations tag-microsoft-365 tag-microsoft-365-copilot tag-network-and-infrastructure tag-security-and-risk-management tag-works-councils m-blog-post\">\n\n<div data-bi-tN=\"Post card: Harnessing AI: How a data council is powering our unified data strategy at Microsoft\" class=\"wp-block-group cta-card has-base-background-color has-background has-link-color wp-elements-63e0dd3f3012c00c158d00f414060934 is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-69c550ab wp-block-group-is-layout-flex wp-block-null\"><figure style=\"aspect-ratio:16\/9;width:100%;\" class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2300\" height=\"1293\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10849-Hero_image.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"border-top-left-radius:6px;border-top-right-radius:6px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10849-Hero_image.jpg 2300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10849-Hero_image-300x169.jpg 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10849-Hero_image-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10849-Hero_image-768x432.jpg 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10849-Hero_image-1536x863.jpg 1536w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10849-Hero_image-2048x1151.jpg 2048w\" sizes=\"auto, (max-width: 2300px) 100vw, 2300px\" \/><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group has-base-background-color has-background is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-5e10c0d5 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--s);padding-right:var(--wp--preset--spacing--s);padding-bottom:var(--wp--preset--spacing--s);padding-left:var(--wp--preset--spacing--s)\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-e464412c wp-block-group-is-layout-flex\"><div style=\"font-style:normal;font-weight:700; padding-top:var(--wp--preset--spacing--spacing-4);padding-bottom:var(--wp--preset--spacing--spacing-4);padding-left:var(--wp--preset--spacing--spacing-16);padding-right:var(--wp--preset--spacing--spacing-16);margin-top:var(--wp--preset--spacing--spacing-12);margin-bottom:var(--wp--preset--spacing--spacing-4);\" class=\"has-link-color wp-elements-ac64562209d7a03a13db290d65f7f882 wp-block-post-date has-text-color has-black-color has-background has-gray-400-background-color has-body-md-font-size\"><time datetime=\"2026-04-09T09:00:00-07:00\">April 9, 2026<\/time><\/div><\/div>\n\n\n<h3 style=\"font-style:normal;font-weight:700;text-decoration:none; padding-bottom:var(--wp--preset--spacing--spacing-2);\" class=\"wp-block-post-title has-h-5-font-size\"><a data-bi-cN=\"Read blog: Harnessing AI: How a data council is powering our unified data strategy at Microsoft\" data-bi-id=\"23030\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/harnessing-ai-how-a-data-council-is-powering-our-unified-data-strategy-at-microsoft\/\" target=\"_self\" >Harnessing AI: How a data council is powering our unified data strategy at Microsoft<\/a><\/h3>\n\n<a aria-label=\"Read blog: Harnessing AI: How a data council is powering our unified data strategy at Microsoft\" data-bi-cN=\"Read blog: Harnessing AI: How a data council is powering our unified data strategy at Microsoft\" data-bi-id=\"23030\" class=\"is-style-read-more-arrow wp-block-read-more\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/harnessing-ai-how-a-data-council-is-powering-our-unified-data-strategy-at-microsoft\/\" target=\"_self\">Read Blog<span class=\"screen-reader-text\">: Harnessing AI: How a data council is powering our unified data strategy at Microsoft<\/span><\/a><\/div>\n<\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-22863 post type-post status-publish format-standard has-post-thumbnail hentry category-featured category-office-of-the-ciso tag-agent tag-ai tag-ai-deployment-and-adoption tag-cybersecurity tag-microsoft-365 tag-security-and-risk-management tag-zero-trust m-blog-post\">\n\n<div data-bi-tN=\"Post card: Microsoft CISO advice: The most important thing to know about securing AI\" class=\"wp-block-group cta-card has-base-background-color has-background has-link-color wp-elements-63e0dd3f3012c00c158d00f414060934 is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-69c550ab wp-block-group-is-layout-flex wp-block-null\"><figure style=\"aspect-ratio:16\/9;width:100%;\" class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2300\" height=\"1293\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Hero2_image.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"border-top-left-radius:6px;border-top-right-radius:6px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Hero2_image.jpg 2300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Hero2_image-300x169.jpg 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Hero2_image-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Hero2_image-768x432.jpg 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Hero2_image-1536x863.jpg 1536w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/04\/10869-Hero2_image-2048x1151.jpg 2048w\" sizes=\"auto, (max-width: 2300px) 100vw, 2300px\" \/><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group has-base-background-color has-background is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-5e10c0d5 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--s);padding-right:var(--wp--preset--spacing--s);padding-bottom:var(--wp--preset--spacing--s);padding-left:var(--wp--preset--spacing--s)\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-e464412c wp-block-group-is-layout-flex\"><div style=\"font-style:normal;font-weight:700; padding-top:var(--wp--preset--spacing--spacing-4);padding-bottom:var(--wp--preset--spacing--spacing-4);padding-left:var(--wp--preset--spacing--spacing-16);padding-right:var(--wp--preset--spacing--spacing-16);margin-top:var(--wp--preset--spacing--spacing-12);margin-bottom:var(--wp--preset--spacing--spacing-4);\" class=\"has-link-color wp-elements-ac64562209d7a03a13db290d65f7f882 wp-block-post-date has-text-color has-black-color has-background has-gray-400-background-color has-body-md-font-size\"><time datetime=\"2026-04-02T09:00:00-07:00\">April 2, 2026<\/time><\/div><\/div>\n\n\n<h3 style=\"font-style:normal;font-weight:700;text-decoration:none; padding-bottom:var(--wp--preset--spacing--spacing-2);\" class=\"wp-block-post-title has-h-5-font-size\"><a data-bi-cN=\"Read blog: Microsoft CISO advice: The most important thing to know about securing AI\" data-bi-id=\"22863\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/\" target=\"_self\" >Microsoft CISO advice: The most important thing to know about securing AI<\/a><\/h3>\n\n<a aria-label=\"Read blog: Microsoft CISO advice: The most important thing to know about securing AI\" data-bi-cN=\"Read blog: Microsoft CISO advice: The most important thing to know about securing AI\" data-bi-id=\"22863\" class=\"is-style-read-more-arrow wp-block-read-more\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-the-most-important-thing-to-know-about-securing-ai\/\" target=\"_self\">Read Blog<span class=\"screen-reader-text\">: Microsoft CISO advice: The most important thing to know about securing AI<\/span><\/a><\/div>\n<\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-22829 post type-post status-publish format-standard has-post-thumbnail hentry category-featured tag-ai-deployment-and-adoption tag-microsoft-365 tag-security-and-risk-management tag-windows tag-zero-trust m-blog-post\">\n\n<div data-bi-tN=\"Post card: Deploying Microsoft Baseline Security Mode at Microsoft: Our virtuous learning cycle\" class=\"wp-block-group cta-card has-base-background-color has-background has-link-color wp-elements-63e0dd3f3012c00c158d00f414060934 is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-69c550ab wp-block-group-is-layout-flex wp-block-null\"><figure style=\"aspect-ratio:16\/9;width:100%;\" class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2300\" height=\"1293\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10825-Hero_image.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"border-top-left-radius:6px;border-top-right-radius:6px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10825-Hero_image.jpg 2300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10825-Hero_image-300x169.jpg 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10825-Hero_image-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10825-Hero_image-768x432.jpg 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10825-Hero_image-1536x863.jpg 1536w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10825-Hero_image-2048x1151.jpg 2048w\" sizes=\"auto, (max-width: 2300px) 100vw, 2300px\" \/><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group has-base-background-color has-background is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-5e10c0d5 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--s);padding-right:var(--wp--preset--spacing--s);padding-bottom:var(--wp--preset--spacing--s);padding-left:var(--wp--preset--spacing--s)\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-e464412c wp-block-group-is-layout-flex\"><div style=\"font-style:normal;font-weight:700; padding-top:var(--wp--preset--spacing--spacing-4);padding-bottom:var(--wp--preset--spacing--spacing-4);padding-left:var(--wp--preset--spacing--spacing-16);padding-right:var(--wp--preset--spacing--spacing-16);margin-top:var(--wp--preset--spacing--spacing-12);margin-bottom:var(--wp--preset--spacing--spacing-4);\" class=\"has-link-color wp-elements-ac64562209d7a03a13db290d65f7f882 wp-block-post-date has-text-color has-black-color has-background has-gray-400-background-color has-body-md-font-size\"><time datetime=\"2026-03-26T09:05:00-07:00\">March 26, 2026<\/time><\/div><\/div>\n\n\n<h3 style=\"font-style:normal;font-weight:700;text-decoration:none; padding-bottom:var(--wp--preset--spacing--spacing-2);\" class=\"wp-block-post-title has-h-5-font-size\"><a data-bi-cN=\"Read blog: Deploying Microsoft Baseline Security Mode at Microsoft: Our virtuous learning cycle\" data-bi-id=\"22829\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/deploying-microsoft-baseline-security-mode-at-microsoft-our-virtuous-learning-cycle\/\" target=\"_self\" >Deploying Microsoft Baseline Security Mode at Microsoft: Our virtuous learning cycle<\/a><\/h3>\n\n<a aria-label=\"Read blog: Deploying Microsoft Baseline Security Mode at Microsoft: Our virtuous learning cycle\" data-bi-cN=\"Read blog: Deploying Microsoft Baseline Security Mode at Microsoft: Our virtuous learning cycle\" data-bi-id=\"22829\" class=\"is-style-read-more-arrow wp-block-read-more\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/deploying-microsoft-baseline-security-mode-at-microsoft-our-virtuous-learning-cycle\/\" target=\"_self\">Read Blog<span class=\"screen-reader-text\">: Deploying Microsoft Baseline Security Mode at Microsoft: Our virtuous learning cycle<\/span><\/a><\/div>\n<\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-22779 post type-post status-publish format-standard has-post-thumbnail hentry category-featured category-office-of-the-ciso tag-governance tag-microsoft-365 tag-network-security tag-security-and-risk-management tag-zero-trust m-blog-post\">\n\n<div data-bi-tN=\"Post card: Microsoft CISO advice: Read our four tips for securing your network\" class=\"wp-block-group cta-card has-base-background-color has-background has-link-color wp-elements-63e0dd3f3012c00c158d00f414060934 is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-69c550ab wp-block-group-is-layout-flex wp-block-null\"><figure style=\"aspect-ratio:16\/9;width:100%;\" class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2300\" height=\"1293\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10864-Hero_image2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"border-top-left-radius:6px;border-top-right-radius:6px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10864-Hero_image2.jpg 2300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10864-Hero_image2-300x169.jpg 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10864-Hero_image2-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10864-Hero_image2-768x432.jpg 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10864-Hero_image2-1536x863.jpg 1536w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10864-Hero_image2-2048x1151.jpg 2048w\" sizes=\"auto, (max-width: 2300px) 100vw, 2300px\" \/><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group has-base-background-color has-background is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-5e10c0d5 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--s);padding-right:var(--wp--preset--spacing--s);padding-bottom:var(--wp--preset--spacing--s);padding-left:var(--wp--preset--spacing--s)\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-e464412c wp-block-group-is-layout-flex\"><div style=\"font-style:normal;font-weight:700; padding-top:var(--wp--preset--spacing--spacing-4);padding-bottom:var(--wp--preset--spacing--spacing-4);padding-left:var(--wp--preset--spacing--spacing-16);padding-right:var(--wp--preset--spacing--spacing-16);margin-top:var(--wp--preset--spacing--spacing-12);margin-bottom:var(--wp--preset--spacing--spacing-4);\" class=\"has-link-color wp-elements-ac64562209d7a03a13db290d65f7f882 wp-block-post-date has-text-color has-black-color has-background has-gray-400-background-color has-body-md-font-size\"><time datetime=\"2026-03-19T09:00:00-07:00\">March 19, 2026<\/time><\/div><\/div>\n\n\n<h3 style=\"font-style:normal;font-weight:700;text-decoration:none; padding-bottom:var(--wp--preset--spacing--spacing-2);\" class=\"wp-block-post-title has-h-5-font-size\"><a data-bi-cN=\"Read blog: Microsoft CISO advice: Read our four tips for securing your network\" data-bi-id=\"22779\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/\" target=\"_self\" >Microsoft CISO advice: Read our four tips for securing your network<\/a><\/h3>\n\n<a aria-label=\"Read blog: Microsoft CISO advice: Read our four tips for securing your network\" data-bi-cN=\"Read blog: Microsoft CISO advice: Read our four tips for securing your network\" data-bi-id=\"22779\" class=\"is-style-read-more-arrow wp-block-read-more\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/\" target=\"_self\">Read Blog<span class=\"screen-reader-text\">: Microsoft CISO advice: Read our four tips for securing your network<\/span><\/a><\/div>\n<\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-22635 post type-post status-publish format-standard has-post-thumbnail hentry category-featured category-office-of-the-ciso tag-governance tag-microsoft-365 tag-network-security tag-security-and-risk-management tag-zero-trust m-blog-post\">\n\n<div data-bi-tN=\"Post card: Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem\" class=\"wp-block-group cta-card has-base-background-color has-background has-link-color wp-elements-63e0dd3f3012c00c158d00f414060934 is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-69c550ab wp-block-group-is-layout-flex wp-block-null\"><figure style=\"aspect-ratio:16\/9;width:100%;\" class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2300\" height=\"1293\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10860-Hero_image2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Deputy Chief Information Security Officer Raji Dani shares four best practices for securing customer support ecosystems.\" style=\"border-top-left-radius:6px;border-top-right-radius:6px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10860-Hero_image2.jpg 2300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10860-Hero_image2-300x169.jpg 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10860-Hero_image2-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10860-Hero_image2-768x432.jpg 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10860-Hero_image2-1536x863.jpg 1536w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10860-Hero_image2-2048x1151.jpg 2048w\" sizes=\"auto, (max-width: 2300px) 100vw, 2300px\" \/><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group has-base-background-color has-background is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-5e10c0d5 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--s);padding-right:var(--wp--preset--spacing--s);padding-bottom:var(--wp--preset--spacing--s);padding-left:var(--wp--preset--spacing--s)\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-e464412c wp-block-group-is-layout-flex\"><div style=\"font-style:normal;font-weight:700; padding-top:var(--wp--preset--spacing--spacing-4);padding-bottom:var(--wp--preset--spacing--spacing-4);padding-left:var(--wp--preset--spacing--spacing-16);padding-right:var(--wp--preset--spacing--spacing-16);margin-top:var(--wp--preset--spacing--spacing-12);margin-bottom:var(--wp--preset--spacing--spacing-4);\" class=\"has-link-color wp-elements-ac64562209d7a03a13db290d65f7f882 wp-block-post-date has-text-color has-black-color has-background has-gray-400-background-color has-body-md-font-size\"><time datetime=\"2026-03-12T09:00:00-07:00\">March 12, 2026<\/time><\/div><\/div>\n\n\n<h3 style=\"font-style:normal;font-weight:700;text-decoration:none; padding-bottom:var(--wp--preset--spacing--spacing-2);\" class=\"wp-block-post-title has-h-5-font-size\"><a data-bi-cN=\"Read blog: Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem\" data-bi-id=\"22635\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/\" target=\"_self\" >Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem<\/a><\/h3>\n\n<a aria-label=\"Read blog: Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem\" data-bi-cN=\"Read blog: Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem\" data-bi-id=\"22635\" class=\"is-style-read-more-arrow wp-block-read-more\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/\" target=\"_self\">Read Blog<span class=\"screen-reader-text\">: Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem<\/span><\/a><\/div>\n<\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-22539 post type-post status-publish format-standard has-post-thumbnail hentry category-featured category-it-strategy category-uncategorized tag-ai tag-ai-deployment-and-adoption tag-developer-tools tag-device-management tag-employee-experience tag-end-user-services-and-support tag-governance tag-microsoft-365-copilot tag-network-and-infrastructure tag-security-and-risk-management m-blog-post\">\n\n<div data-bi-tN=\"Post card: Powering the new age of AI-led engineering in IT at Microsoft\" class=\"wp-block-group cta-card has-base-background-color has-background has-link-color wp-elements-63e0dd3f3012c00c158d00f414060934 is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-69c550ab wp-block-group-is-layout-flex wp-block-null\"><figure style=\"aspect-ratio:16\/9;width:100%;\" class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2300\" height=\"1293\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10816-Hero_image.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"border-top-left-radius:6px;border-top-right-radius:6px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10816-Hero_image.jpg 2300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10816-Hero_image-300x169.jpg 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10816-Hero_image-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10816-Hero_image-768x432.jpg 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10816-Hero_image-1536x863.jpg 1536w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10816-Hero_image-2048x1151.jpg 2048w\" sizes=\"auto, (max-width: 2300px) 100vw, 2300px\" \/><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group has-base-background-color has-background is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-5e10c0d5 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--s);padding-right:var(--wp--preset--spacing--s);padding-bottom:var(--wp--preset--spacing--s);padding-left:var(--wp--preset--spacing--s)\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-e464412c wp-block-group-is-layout-flex\"><div style=\"font-style:normal;font-weight:700; padding-top:var(--wp--preset--spacing--spacing-4);padding-bottom:var(--wp--preset--spacing--spacing-4);padding-left:var(--wp--preset--spacing--spacing-16);padding-right:var(--wp--preset--spacing--spacing-16);margin-top:var(--wp--preset--spacing--spacing-12);margin-bottom:var(--wp--preset--spacing--spacing-4);\" class=\"has-link-color wp-elements-ac64562209d7a03a13db290d65f7f882 wp-block-post-date has-text-color has-black-color has-background has-gray-400-background-color has-body-md-font-size\"><time datetime=\"2026-03-05T09:05:00-08:00\">March 5, 2026<\/time><\/div><\/div>\n\n\n<h3 style=\"font-style:normal;font-weight:700;text-decoration:none; padding-bottom:var(--wp--preset--spacing--spacing-2);\" class=\"wp-block-post-title has-h-5-font-size\"><a data-bi-cN=\"Read blog: Powering the new age of AI-led engineering in IT at Microsoft\" data-bi-id=\"22539\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/powering-the-new-age-of-ai-led-engineering-in-it-at-microsoft\/\" target=\"_self\" >Powering the new age of AI-led engineering in IT at Microsoft<\/a><\/h3>\n\n<a aria-label=\"Read blog: Powering the new age of AI-led engineering in IT at Microsoft\" data-bi-cN=\"Read blog: Powering the new age of AI-led engineering in IT at Microsoft\" data-bi-id=\"22539\" class=\"is-style-read-more-arrow wp-block-read-more\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/powering-the-new-age-of-ai-led-engineering-in-it-at-microsoft\/\" target=\"_self\">Read Blog<span class=\"screen-reader-text\">: Powering the new age of AI-led engineering in IT at Microsoft<\/span><\/a><\/div>\n<\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-22530 post type-post status-publish format-standard has-post-thumbnail hentry category-featured category-uncategorized tag-corporate-functions tag-digital-transformation tag-end-user-services-and-support tag-it-and-business-operations tag-security-and-risk-management tag-windows tag-zero-trust m-blog-post\">\n\n<div data-bi-tN=\"Post card: Getting started with Windows Hello for Business and Day 1 authentication at Microsoft\" class=\"wp-block-group cta-card has-base-background-color has-background has-link-color wp-elements-63e0dd3f3012c00c158d00f414060934 is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-69c550ab wp-block-group-is-layout-flex wp-block-null\"><figure style=\"aspect-ratio:16\/9;width:100%;\" class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2300\" height=\"1293\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10770-Hero_image.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"border-top-left-radius:6px;border-top-right-radius:6px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10770-Hero_image.jpg 2300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10770-Hero_image-300x169.jpg 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10770-Hero_image-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10770-Hero_image-768x432.jpg 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10770-Hero_image-1536x863.jpg 1536w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10770-Hero_image-2048x1151.jpg 2048w\" sizes=\"auto, (max-width: 2300px) 100vw, 2300px\" \/><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group has-base-background-color has-background is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-5e10c0d5 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--s);padding-right:var(--wp--preset--spacing--s);padding-bottom:var(--wp--preset--spacing--s);padding-left:var(--wp--preset--spacing--s)\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-e464412c wp-block-group-is-layout-flex\"><div style=\"font-style:normal;font-weight:700; padding-top:var(--wp--preset--spacing--spacing-4);padding-bottom:var(--wp--preset--spacing--spacing-4);padding-left:var(--wp--preset--spacing--spacing-16);padding-right:var(--wp--preset--spacing--spacing-16);margin-top:var(--wp--preset--spacing--spacing-12);margin-bottom:var(--wp--preset--spacing--spacing-4);\" class=\"has-link-color wp-elements-ac64562209d7a03a13db290d65f7f882 wp-block-post-date has-text-color has-black-color has-background has-gray-400-background-color has-body-md-font-size\"><time datetime=\"2026-03-05T09:00:00-08:00\">March 5, 2026<\/time><\/div><\/div>\n\n\n<h3 style=\"font-style:normal;font-weight:700;text-decoration:none; padding-bottom:var(--wp--preset--spacing--spacing-2);\" class=\"wp-block-post-title has-h-5-font-size\"><a data-bi-cN=\"Read blog: Getting started with Windows Hello for Business and Day 1 authentication at Microsoft\" data-bi-id=\"22530\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/\" target=\"_self\" >Getting started with Windows Hello for Business and Day 1 authentication at Microsoft<\/a><\/h3>\n\n<a aria-label=\"Read blog: Getting started with Windows Hello for Business and Day 1 authentication at Microsoft\" data-bi-cN=\"Read blog: Getting started with Windows Hello for Business and Day 1 authentication at Microsoft\" data-bi-id=\"22530\" class=\"is-style-read-more-arrow wp-block-read-more\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/getting-started-with-windows-hello-for-business-and-day-1-authentication-at-microsoft\/\" target=\"_self\">Read Blog<span class=\"screen-reader-text\">: Getting started with Windows Hello for Business and Day 1 authentication at Microsoft<\/span><\/a><\/div>\n<\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-22465 post type-post status-publish format-standard has-post-thumbnail hentry category-featured category-uncategorized tag-azure-and-cloud-infrastructure tag-end-user-services-and-support tag-microsoft-azure tag-network-and-infrastructure tag-security-and-risk-management m-blog-post\">\n\n<div data-bi-tN=\"Post card: Protecting anonymity at scale: How we built cloud-first hidden membership groups at Microsoft\" class=\"wp-block-group cta-card has-base-background-color has-background has-link-color wp-elements-63e0dd3f3012c00c158d00f414060934 is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-69c550ab wp-block-group-is-layout-flex wp-block-null\"><figure style=\"aspect-ratio:16\/9;width:100%;\" class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2300\" height=\"1293\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10800_Hero-image.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"border-top-left-radius:6px;border-top-right-radius:6px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10800_Hero-image.jpg 2300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10800_Hero-image-300x169.jpg 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10800_Hero-image-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10800_Hero-image-768x432.jpg 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10800_Hero-image-1536x863.jpg 1536w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10800_Hero-image-2048x1151.jpg 2048w\" sizes=\"auto, (max-width: 2300px) 100vw, 2300px\" \/><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group has-base-background-color has-background is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-5e10c0d5 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--s);padding-right:var(--wp--preset--spacing--s);padding-bottom:var(--wp--preset--spacing--s);padding-left:var(--wp--preset--spacing--s)\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-e464412c wp-block-group-is-layout-flex\"><div style=\"font-style:normal;font-weight:700; padding-top:var(--wp--preset--spacing--spacing-4);padding-bottom:var(--wp--preset--spacing--spacing-4);padding-left:var(--wp--preset--spacing--spacing-16);padding-right:var(--wp--preset--spacing--spacing-16);margin-top:var(--wp--preset--spacing--spacing-12);margin-bottom:var(--wp--preset--spacing--spacing-4);\" class=\"has-link-color wp-elements-ac64562209d7a03a13db290d65f7f882 wp-block-post-date has-text-color has-black-color has-background has-gray-400-background-color has-body-md-font-size\"><time datetime=\"2026-02-26T09:00:00-08:00\">February 26, 2026<\/time><\/div><\/div>\n\n\n<h3 style=\"font-style:normal;font-weight:700;text-decoration:none; padding-bottom:var(--wp--preset--spacing--spacing-2);\" class=\"wp-block-post-title has-h-5-font-size\"><a data-bi-cN=\"Read blog: Protecting anonymity at scale: How we built cloud-first hidden membership groups at Microsoft\" data-bi-id=\"22465\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/protecting-anonymity-at-scale-how-we-built-cloud-first-hidden-membership-groups-at-microsoft\/\" target=\"_self\" >Protecting anonymity at scale: How we built cloud-first hidden membership groups at Microsoft<\/a><\/h3>\n\n<a aria-label=\"Read blog: Protecting anonymity at scale: How we built cloud-first hidden membership groups at Microsoft\" data-bi-cN=\"Read blog: Protecting anonymity at scale: How we built cloud-first hidden membership groups at Microsoft\" data-bi-id=\"22465\" class=\"is-style-read-more-arrow wp-block-read-more\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/protecting-anonymity-at-scale-how-we-built-cloud-first-hidden-membership-groups-at-microsoft\/\" target=\"_self\">Read Blog<span class=\"screen-reader-text\">: Protecting anonymity at scale: How we built cloud-first hidden membership groups at Microsoft<\/span><\/a><\/div>\n<\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-22324 post type-post status-publish format-standard has-post-thumbnail hentry category-featured category-uncategorized tag-agent tag-ai tag-end-user-services-and-support tag-governance tag-microsoft-365-copilot tag-network-and-infrastructure tag-security-and-risk-management m-blog-post\">\n\n<div data-bi-tN=\"Post card: Protecting AI conversations at Microsoft with Model Context Protocol security and governance\" class=\"wp-block-group cta-card has-base-background-color has-background has-link-color wp-elements-63e0dd3f3012c00c158d00f414060934 is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-69c550ab wp-block-group-is-layout-flex wp-block-null\"><figure style=\"aspect-ratio:16\/9;width:100%;\" class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2300\" height=\"1293\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10799_Hero-image.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"border-top-left-radius:6px;border-top-right-radius:6px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10799_Hero-image.jpg 2300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10799_Hero-image-300x169.jpg 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10799_Hero-image-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10799_Hero-image-768x432.jpg 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10799_Hero-image-1536x863.jpg 1536w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10799_Hero-image-2048x1151.jpg 2048w\" sizes=\"auto, (max-width: 2300px) 100vw, 2300px\" \/><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group has-base-background-color has-background is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-5e10c0d5 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--s);padding-right:var(--wp--preset--spacing--s);padding-bottom:var(--wp--preset--spacing--s);padding-left:var(--wp--preset--spacing--s)\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-e464412c wp-block-group-is-layout-flex\"><div style=\"font-style:normal;font-weight:700; padding-top:var(--wp--preset--spacing--spacing-4);padding-bottom:var(--wp--preset--spacing--spacing-4);padding-left:var(--wp--preset--spacing--spacing-16);padding-right:var(--wp--preset--spacing--spacing-16);margin-top:var(--wp--preset--spacing--spacing-12);margin-bottom:var(--wp--preset--spacing--spacing-4);\" class=\"has-link-color wp-elements-ac64562209d7a03a13db290d65f7f882 wp-block-post-date has-text-color has-black-color has-background has-gray-400-background-color has-body-md-font-size\"><time datetime=\"2026-02-12T09:05:00-08:00\">February 12, 2026<\/time><\/div><\/div>\n\n\n<h3 style=\"font-style:normal;font-weight:700;text-decoration:none; padding-bottom:var(--wp--preset--spacing--spacing-2);\" class=\"wp-block-post-title has-h-5-font-size\"><a data-bi-cN=\"Read blog: Protecting AI conversations at Microsoft with Model Context Protocol security and governance\" data-bi-id=\"22324\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/protecting-ai-conversations-at-microsoft-with-model-context-protocol-security-and-governance\/\" target=\"_self\" >Protecting AI conversations at Microsoft with Model Context Protocol security and governance<\/a><\/h3>\n\n<a aria-label=\"Read blog: Protecting AI conversations at Microsoft with Model Context Protocol security and governance\" data-bi-cN=\"Read blog: Protecting AI conversations at Microsoft with Model Context Protocol security and governance\" data-bi-id=\"22324\" class=\"is-style-read-more-arrow wp-block-read-more\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/protecting-ai-conversations-at-microsoft-with-model-context-protocol-security-and-governance\/\" target=\"_self\">Read Blog<span class=\"screen-reader-text\">: Protecting AI conversations at Microsoft with Model Context Protocol security and governance<\/span><\/a><\/div>\n<\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-22272 post type-post status-publish format-standard has-post-thumbnail hentry category-featured category-uncategorized tag-data-and-ai tag-governance tag-microsoft-azure tag-security-and-risk-management m-blog-post\">\n\n<div data-bi-tN=\"Post card: Powering data governance at Microsoft with Purview Unified Catalog\" class=\"wp-block-group cta-card has-base-background-color has-background has-link-color wp-elements-63e0dd3f3012c00c158d00f414060934 is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-69c550ab wp-block-group-is-layout-flex wp-block-null\"><figure style=\"aspect-ratio:16\/9;width:100%;\" class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2300\" height=\"1293\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10750-Hero_image.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"border-top-left-radius:6px;border-top-right-radius:6px;width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10750-Hero_image.jpg 2300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10750-Hero_image-300x169.jpg 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10750-Hero_image-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10750-Hero_image-768x432.jpg 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10750-Hero_image-1536x863.jpg 1536w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/02\/10750-Hero_image-2048x1151.jpg 2048w\" sizes=\"auto, (max-width: 2300px) 100vw, 2300px\" \/><\/figure>\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-group has-base-background-color has-background is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-5e10c0d5 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--s);padding-right:var(--wp--preset--spacing--s);padding-bottom:var(--wp--preset--spacing--s);padding-left:var(--wp--preset--spacing--s)\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-e464412c wp-block-group-is-layout-flex\"><div style=\"font-style:normal;font-weight:700; padding-top:var(--wp--preset--spacing--spacing-4);padding-bottom:var(--wp--preset--spacing--spacing-4);padding-left:var(--wp--preset--spacing--spacing-16);padding-right:var(--wp--preset--spacing--spacing-16);margin-top:var(--wp--preset--spacing--spacing-12);margin-bottom:var(--wp--preset--spacing--spacing-4);\" class=\"has-link-color wp-elements-ac64562209d7a03a13db290d65f7f882 wp-block-post-date has-text-color has-black-color has-background has-gray-400-background-color has-body-md-font-size\"><time datetime=\"2026-02-05T09:00:00-08:00\">February 5, 2026<\/time><\/div><\/div>\n\n\n<h3 style=\"font-style:normal;font-weight:700;text-decoration:none; padding-bottom:var(--wp--preset--spacing--spacing-2);\" class=\"wp-block-post-title has-h-5-font-size\"><a data-bi-cN=\"Read blog: Powering data governance at Microsoft with Purview Unified Catalog\" data-bi-id=\"22272\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/powering-data-governance-at-microsoft-with-purview-unified-catalog\/\" target=\"_self\" >Powering data governance at Microsoft with Purview Unified Catalog<\/a><\/h3>\n\n<a aria-label=\"Read blog: Powering data governance at Microsoft with Purview Unified Catalog\" data-bi-cN=\"Read blog: Powering data governance at Microsoft with Purview Unified Catalog\" data-bi-id=\"22272\" class=\"is-style-read-more-arrow wp-block-read-more\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/powering-data-governance-at-microsoft-with-purview-unified-catalog\/\" target=\"_self\">Read Blog<span class=\"screen-reader-text\">: Powering data governance at Microsoft with Purview Unified Catalog<\/span><\/a><\/div>\n<\/div>\n<\/div>\n\n<\/li><\/ul><\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-fb3c4f80 wp-block-buttons-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--spacing-32);margin-bottom:var(--wp--preset--spacing--spacing-32)\">\n<div class=\"wp-block-button is-style-button-cta\"><a data-bi-cN=\"Link: View all\"class=\"wp-block-button__link has-text-align-center wp-element-button\" href=\"\/insidetrack\/blog\/?s=Security\">View all<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-0710bd17 wp-block-group-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--spacing-48)\"><div class=\"wp-block-inside-track-image-link\">\n\t<a data-bi-cN=\"Link to: About us\" href=\"https:\/\/www.microsoft.com\/en-us\/itshowcase\/about-us\" >\n\t\t<img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"120\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/07\/RWqJhw.png\" class=\"attachment-medium size-medium\" alt=\"\" \/>\t\t<span>About us<\/span>\n\t<\/a>\n<\/div>\n\n\n<div class=\"wp-block-inside-track-image-link\">\n\t<a data-bi-cN=\"Link to: Videos\" href=\"https:\/\/www.microsoft.com\/en-us\/itshowcase\/Videos\" >\n\t\t<img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"120\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/07\/RWqJhz.png\" class=\"attachment-medium size-medium\" alt=\"\" \/>\t\t<span>Videos<\/span>\n\t<\/a>\n<\/div>\n\n\n<div class=\"wp-block-inside-track-image-link\">\n\t<a data-bi-cN=\"Link to: Blog\" href=\"https:\/\/www.microsoft.com\/itshowcase\/blog\/\" >\n\t\t<img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"120\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/07\/RWqOu8.png\" class=\"attachment-medium size-medium\" alt=\"\" \/>\t\t<span>Blog<\/span>\n\t<\/a>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-left is-layout-flex wp-container-core-group-is-layout-10567cce wp-block-group-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--spacing-48)\">\n<p class=\"has-gray-500-color has-text-color has-link-color wp-elements-a4bb662bae8cd10516a7f0ea388d0144 wp-block-paragraph\">Follow Microsoft<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-style-default is-layout-flex wp-container-core-social-links-is-layout-f15d38d1 wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-facebook  wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.facebook.com\/Microsoft\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-x  wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.twitter.com\/Microsoft\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M13.982 10.622 20.54 3h-1.554l-5.693 6.618L8.745 3H3.5l6.876 10.007L3.5 21h1.554l6.012-6.989L15.868 21h5.245l-7.131-10.378Zm-2.128 2.474-.697-.997-5.543-7.93H8l4.474 6.4.697.996 5.815 8.318h-2.387l-4.745-6.787Z\" \/><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">X<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-linkedin  wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/microsoft\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li><\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>At Microsoft, our identity-driven security solutions protect users, devices, and data from potential vulnerabilities at every touchpoint, everywhere they work. Artificial intelligence and machine learning help us automate mundane security tasks, and complex product integrations improve our threat detection and remediation efforts. Learn how Microsoft Digital supports our global workforce and secures valuable company and [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":15897,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"coauthors":[138],"class_list":["post-15792","page","type-page","status-publish","has-post-thumbnail","hentry","m-blog-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security and Risk Management - How Microsoft does IT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/security-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security and Risk Management - How Microsoft does IT\" \/>\n<meta property=\"og:description\" content=\"At Microsoft, our identity-driven security solutions protect users, devices, and data from potential vulnerabilities at every touchpoint, everywhere they work. Artificial intelligence and machine learning help us automate mundane security tasks, and complex product integrations improve our threat detection and remediation efforts. Learn how Microsoft Digital supports our global workforce and secures valuable company and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/security-3\/\" \/>\n<meta property=\"og:site_name\" content=\"Inside Track Blog\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-02T18:39:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/07\/RW1itI7.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2120\" \/>\n\t<meta property=\"og:image:height\" content=\"795\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Lukas Velush\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/security-3\\\/\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/security-3\\\/\",\"name\":\"Security and Risk Management - How Microsoft does IT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/security-3\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/security-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2024\\\/07\\\/RW1itI7.jpg\",\"datePublished\":\"2024-07-17T23:46:19+00:00\",\"dateModified\":\"2026-03-02T18:39:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/security-3\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/security-3\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/security-3\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2024\\\/07\\\/RW1itI7.jpg\",\"contentUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2024\\\/07\\\/RW1itI7.jpg\",\"width\":2120,\"height\":795,\"caption\":\"Outside of a conference room or board room meeting including people sitting around table in a room with international time clocks.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/security-3\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security and Risk Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\",\"name\":\"Inside Track Blog\",\"description\":\"How Microsoft does IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security and Risk Management - How Microsoft does IT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/insidetrack\/blog\/security-3\/","og_locale":"en_US","og_type":"article","og_title":"Security and Risk Management - How Microsoft does IT","og_description":"At Microsoft, our identity-driven security solutions protect users, devices, and data from potential vulnerabilities at every touchpoint, everywhere they work. Artificial intelligence and machine learning help us automate mundane security tasks, and complex product integrations improve our threat detection and remediation efforts. Learn how Microsoft Digital supports our global workforce and secures valuable company and [&hellip;]","og_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/security-3\/","og_site_name":"Inside Track Blog","article_modified_time":"2026-03-02T18:39:13+00:00","og_image":[{"width":2120,"height":795,"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/07\/RW1itI7.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute","Written by":"Lukas Velush"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/security-3\/","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/security-3\/","name":"Security and Risk Management - How Microsoft does IT","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/security-3\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/security-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/07\/RW1itI7.jpg","datePublished":"2024-07-17T23:46:19+00:00","dateModified":"2026-03-02T18:39:13+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/security-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/insidetrack\/blog\/security-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/security-3\/#primaryimage","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/07\/RW1itI7.jpg","contentUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/07\/RW1itI7.jpg","width":2120,"height":795,"caption":"Outside of a conference room or board room meeting including people sitting around table in a room with international time clocks."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/security-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/insidetrack\/blog\/"},{"@type":"ListItem","position":2,"name":"Security and Risk Management"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/","name":"Inside Track Blog","description":"How Microsoft does IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P9hcZA-46I","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/pages\/15792","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/comments?post=15792"}],"version-history":[{"count":7,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/pages\/15792\/revisions"}],"predecessor-version":[{"id":22505,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/pages\/15792\/revisions\/22505"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media\/15897"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media?parent=15792"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/coauthors?post=15792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}