CISO series: Talking cybersecurity with the board of directors
To maintain a board’s confidence, you need to engage them in your strategy early and often.
To maintain a board’s confidence, you need to engage them in your strategy early and often.
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 4.
“Not another portal, not another password!” —Learn how lululemon implemented Azure AD for cloud Identity and Access Management, simplifying user access without reducing business flexibility.
Microsoft Defender ATP, Microsoft’s endpoint protection platform, addresses this challenge by integrating with Azure Information Protection, Microsoft’s data classification, labeling, and protection solution.
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In today’s installment, “Step 3. Protect your identities,” you’ll learn how to define security policies to protect individual user identities against account compromise and protect your administrative accounts.
Learn about the top feature updates for Microsoft Threat Protection in January.
Microsoft jumped to the Challenger position in the Gartner’s 2018 Magic Quadrant for CASB and solidified its Leadership position in KuppingerCole’s 2018 Leadership Compass in the same product category.
The Center for Internet Security’s (CIS) Microsoft 365 Foundations Benchmark provides prescriptive guidance for establishing a secure baseline configuration for Microsoft 365.
Multi-stakeholder collaboration helps to build better security policies in the recently released Guide to Developing a National Cybersecurity Strategy.
Recent research on email journaling—an often used testing methodology—shows it can lead to misinterpreted results.