RSA Conference 2020—Empower your defenders with artificial intelligence and automation

Read more RSA Conference 2020—Empower your defenders with artificial intelligence and automation

Unifying security policy across all mobile form-factors with Wandera and Microsoft

Read more Unifying security policy across all mobile form-factors with Wandera and Microsoft

Defending the power grid against supply chain attacks—Part 1: The risk defined

Read more Defending the power grid against supply chain attacks—Part 1: The risk defined

Changing the Monolith—Part 4: Quick tech wins for a cloud-first world

Read more Changing the Monolith—Part 4: Quick tech wins for a cloud-first world

Mattress Firm deployed Azure Active Directory to securely connect Firstline Workers to their SaaS apps and to each other

Read more Mattress Firm deployed Azure Active Directory to securely connect Firstline Workers to their SaaS apps and to each other

NERC CIP compliance in Azure

Read more NERC CIP compliance in Azure

Building on secure productivity

Read more Building on secure productivity

Afternoon Cyber Tea—From threat intelligence to chatbots: A look at AI in cybersecurity

Read more Afternoon Cyber Tea—From threat intelligence to chatbots: A look at AI in cybersecurity

Visionary security partners to be honored at the very first Microsoft Security 20/20 event

Read more Visionary security partners to be honored at the very first Microsoft Security 20/20 event

Ghost in the shell: Investigating web shell attacks

Read more Ghost in the shell: Investigating web shell attacks

Guarding against supply chain attacks—Part 2: Hardware risks

Read more Guarding against supply chain attacks—Part 2: Hardware risks

New capabilities for eDiscovery now available

Read more New capabilities for eDiscovery now available

Changing the Monolith—Part 3: What’s your process?

Read more Changing the Monolith—Part 3: What’s your process?