Guiding principles of our identity strategy: staying ahead of evolving customer needs

Read more Guiding principles of our identity strategy: staying ahead of evolving customer needs

RSA Conference 2020—Empower your defenders with artificial intelligence and automation

Read more RSA Conference 2020—Empower your defenders with artificial intelligence and automation

Introducing Microsoft Application Inspector

Read more Introducing Microsoft Application Inspector

Foundations of Flow—secure and compliant automation, part 2

Read more Foundations of Flow—secure and compliant automation, part 2

CISO Series: Lessons learned from the Microsoft SOC—Part 2a: Organizing people

Read more CISO Series: Lessons learned from the Microsoft SOC—Part 2a: Organizing people

Recommendations for deploying the latest Attack surface reduction rules for maximum impact

Read more Recommendations for deploying the latest Attack surface reduction rules for maximum impact

CISO Series: Lessons learned from the Microsoft SOC—Part 1: Organization

Read more CISO Series: Lessons learned from the Microsoft SOC—Part 1: Organization

Why the Pipeline Cybersecurity Initiative is a critical step

Read more Why the Pipeline Cybersecurity Initiative is a critical step

Announcing the new Security Engineering website

Read more Announcing the new Security Engineering website

The evolution of Microsoft Threat Protection, January update

Read more The evolution of Microsoft Threat Protection, January update

The AI cybersecurity impact for IoT

Read more The AI cybersecurity impact for IoT

Zero Trust part 1: Identity and access management

Read more Zero Trust part 1: Identity and access management

What’s new in Windows Defender ATP

Read more What’s new in Windows Defender ATP