CISO series: Lessons learned from the Microsoft SOC—Part 3b: A day in the life

Read more CISO series: Lessons learned from the Microsoft SOC—Part 3b: A day in the life

Mobile threat defense and intelligence are a core part of cyber defense

Read more Mobile threat defense and intelligence are a core part of cyber defense

Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks

Read more Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks

Data governance and retention in your Microsoft 365 tenant—a secure and highly capable solution

Read more Data governance and retention in your Microsoft 365 tenant—a secure and highly capable solution

Norsk Hydro responds to ransomware attack with transparency

Read more Norsk Hydro responds to ransomware attack with transparency

How to secure your IoT deployment during the security talent shortage

Read more How to secure your IoT deployment during the security talent shortage

Ransomware response—to pay or not to pay?

Read more Ransomware response—to pay or not to pay?

Finding a common language to describe AI security threats

Read more Finding a common language to describe AI security threats

Multi-stage downloader Trojan sLoad abuses BITS almost exclusively for malicious activities

Read more Multi-stage downloader Trojan sLoad abuses BITS almost exclusively for malicious activities

GALLIUM: Targeting global telecom

Read more GALLIUM: Targeting global telecom