Skip to main content
Skip to main content
Microsoft
Microsoft Security
Microsoft Security
Microsoft Security
Home
Solutions
Cloud security
Frontline workers
Identity & access
Information protection & governance
Ransomware
Risk management
Secure remote work
SIEM & XDR
Small & medium business
Zero Trust
Products
Product families
Product families
Microsoft Defender
Microsoft Entra
Microsoft Purview
Identity & access
Identity & access
Azure Active Directory part of Microsoft Entra
Microsoft Entra Permissions Management
Microsoft Entra Verified ID
Azure Key Vault
SIEM & XDR
SIEM & XDR
Microsoft Sentinel
Microsoft Defender for Cloud
Microsoft 365 Defender
Microsoft Defender for Endpoint
Microsoft Defender for Office 365
Microsoft Defender for Identity
Microsoft Defender for Cloud Apps
Microsoft Defender Vulnerability Management
Cloud security
Cloud security
Microsoft Defender for Cloud
Azure Firewall
Azure Web App Firewall
Azure DDoS Protection
GitHub Advanced Security
Endpoint security
Endpoint security
Microsoft 365 Defender
Microsoft Defender for Endpoint
Microsoft Defender for IoT
Microsoft Defender for Business
Microsoft Defender Vulnerability Management
Risk management & privacy
Risk management & privacy
Microsoft Purview Insider Risk Management
Microsoft Purview Communication Compliance
Microsoft Purview eDiscovery
Microsoft Purview Compliance Manager
Microsoft Priva Risk Management
Microsoft Priva Subject Rights Requests
Information protection
Information protection
Microsoft Purview Information Protection
Microsoft Purview Data Lifecycle Management
Microsoft Purview Data Loss Prevention
Microsoft Priva Risk Management
Microsoft Priva Subject Rights Requests
Device management
Device management
Microsoft Endpoint Manager
Services
Microsoft Security Experts
Microsoft Defender Experts for Hunting
Microsoft Security Services for Enterprise
Microsoft Security Services for Incident Response
Microsoft Security Services for Modernization
Partners
Resources
Get started
Get started
Customer stories
Security 101
Product trials
How we protect Microsoft
Reports and analysis
Reports and analysis
Microsoft Security Insider
Microsoft Digital Defense Report
Security Response Center
Community
Community
Microsoft Security Blog
Microsoft Security Events
Microsoft Tech Community
Documentation and training
Documentation and training
Documentation
Technical Content Library
Training & certifications
Additional sites
Additional sites
Compliance Program for Microsoft Cloud
Microsoft Trust Center
Security Engineering Portal
Service Trust Portal
Contact sales
More
Start free trial
All Microsoft
Microsoft Security
Azure
Dynamics 365
Microsoft 365
Microsoft Teams
Windows 365
Tech & innovation
Tech & innovation
Microsoft Cloud
AI
Azure Space
Mixed reality
Microsoft HoloLens
Microsoft Viva
Quantum computing
Sustainability
Industries
Industries
Education
Automotive
Financial services
Government
Healthcare
Manufacturing
Retail
All industries
Partners
Partners
Find a partner
Become a partner
Partner Network
Find an advertising partner
Become an advertising partner
Azure Marketplace
AppSource
Resources
Resources
Blog
Microsoft Advertising
Developer Center
Documentation
Events
Licensing
Microsoft Learn
Microsoft Research
View Sitemap
Search
Search Microsoft Security
Cancel
Sign in
Author: Tim Rains
August 17, 2016
• 2 min read
Rise in severe vulnerabilities highlights importance of software updates
In the context of computer security, vulnerabilities are weaknesses in software that could allow an attacker to compromise the integrity, availability, or confidentiality of either the software itself or the system it’s running on. Some of the worst vulnerabilities allow attackers to exploit the compromised system by causing it to run malicious code without the…
Read more
Rise in severe vulnerabilities highlights importance of software updates
June 14, 2016
• 8 min read
What’s Been Happening in the Threat Landscape in the European Union
Recently, I had the opportunity to visit customers in several countries in the European Union (EU). The threat landscape in the EU has been changing rapidly, and in some unpredictable ways. I thought it was time to share some new data and insights based on data from the latest volume of the Microsoft Security Intelligence…
Read more
What’s Been Happening in the Threat Landscape in the European Union
June 9, 2016
• 3 min read
Dream Team for Moving to the Cloud
The U.S. men’s basketball team suffering defeat, placing third even, at the 1988 Summer Olympics, in which the U.S. should unquestionably have dominated, renewed calls to use professional athletes in the games. The following year it was agreed, and U.S. basketball asked the NBA to supply players for the upcoming 1992 games in Barcelona. The…
Read more
Dream Team for Moving to the Cloud
May 20, 2016
• <1 min read
What do Goldie Hawn, Kobe Bryant, Al Gore, Jessica Alba, Tony Blair, Wayne Gretzky, and Microsoft’s Tim Rains all have in common? The Milken Institute Global Conference 2016
A couple of weeks ago I was very honored to participate in a panel at the Milken Global Conference. This was an excellent event with a true C-suite audience in attendance. The list of speakers at this event was unbelievable. The panel I participated on was called “Cyber Resilience: New Line of Defense for Business.”…
Read more
What do Goldie Hawn, Kobe Bryant, Al Gore, Jessica Alba, Tony Blair, Wayne Gretzky, and Microsoft’s Tim Rains all have in common? The Milken Institute Global Conference 2016
May 5, 2016
• 6 min read
Protecting Identities in the Cloud: Mitigating Password Attacks
We just released a new volume of the Microsoft Security Intelligence Report. Included in the report, for the first time, is security data from the Microsoft cloud that reveals how we are leveraging an intelligent security graph to inform how we protect endpoints, better detect attacks and accelerate our response, to help protect our customers.…
Read more
Protecting Identities in the Cloud: Mitigating Password Attacks
May 5, 2016
• 1 min read
Microsoft Security Intelligence Report Volume 20 is now available
The latest volume of the Microsoft Security Intelligence Report (SIR) is now available for free download at www.microsoft.com/sir. We’ve been publishing threat intelligence reports for our customers, partners and the industry for 10 years now. During that time, we’ve published over 12,500 pages of threat intelligence, 100+ blog posts, many videos, and delivered thousands of…
Read more
Microsoft Security Intelligence Report Volume 20 is now available
April 22, 2016
• 8 min read
Ransomware: Understanding the Risk
Ransomware is a type of malware that holds computers or files for ransom by encrypting files or locking the desktop or browser on systems that are infected with it, then demanding a ransom in order to regain access. Criminals have used high pressure techniques to get victims to pay the ransom, such as: Make encrypted…
Read more
Ransomware: Understanding the Risk
March 21, 2016
• 1 min read
Cloud Security Alliance Summit 2016: I Survived the Shark Tank
A few weeks back I had the opportunity to I speak at the Cloud Security Alliance Summit 2016 held in San Francisco, California. Microsoft was a Platinum sponsor of the event. I participated in a panel discussion on cloud security that focused on lessons learned from a cloud services provider’s point of view. Google, Dropbox,…
Read more
Cloud Security Alliance Summit 2016: I Survived the Shark Tank
March 8, 2016
• 1 min read
TechNet Virtual Conference 2016: security, patching, vulnerabilities and exploitation
Last week I participated in the TechNet Virtual Conference 2016. It was a great three-day event with many excellent speakers that discussed a wide range of topics. The sessions were anchored by journalist Mary Jo Foley and Senior Microsoft Evangelist Rick Claus. If you missed the event last week, the good news is that the…
Read more
TechNet Virtual Conference 2016: security, patching, vulnerabilities and exploitation
February 25, 2016
• <1 min read
Progress Report: Enterprise security for our mobile-first, cloud-first world
Today Microsoft made numerous announcements about new security capabilities, products and features. These are all designed to help our customers accelerate the adoption of a more holistic security posture that helps protect, detect and respond to modern security threats. All of the details are available in this article: Progress Report: Enterprise security for our mobile-first,…
Read more
Progress Report: Enterprise security for our mobile-first, cloud-first world
1
2
3
…
29
Next Page