Subscribe

Microsoft open sources CodeQL queries used to hunt for Solorigate activity

Read more Microsoft open sources CodeQL queries used to hunt for Solorigate activity

Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective

Read more Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective

Microsoft listed as a Representative Vendor in 2020 Gartner Market Guide for Insider Risk Management Solutions

Read more Microsoft listed as a Representative Vendor in 2020 Gartner Market Guide for Insider Risk Management Solutions

Securing Azure datacenters with continuous IoT/OT monitoring

Read more Securing Azure datacenters with continuous IoT/OT monitoring

What we like about Microsoft Defender for Endpoint

Read more What we like about Microsoft Defender for Endpoint

Turning the page on Solorigate and opening the next chapter for the security community

Read more Turning the page on Solorigate and opening the next chapter for the security community

6 strategies to reduce cybersecurity alert fatigue in your SOC

Read more 6 strategies to reduce cybersecurity alert fatigue in your SOC

Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic

Read more Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic

A playbook for modernizing security operations

Read more A playbook for modernizing security operations

Web shell attacks continue to rise

Read more Web shell attacks continue to rise

Why threat protection is critical to your Zero Trust security strategy

Read more Why threat protection is critical to your Zero Trust security strategy

Sophisticated cybersecurity threats demand collaborative, global response

Read more Sophisticated cybersecurity threats demand collaborative, global response