From unstructured data to actionable intelligence: Using machine learning for threat intelligence

Read more From unstructured data to actionable intelligence: Using machine learning for threat intelligence

Lessons learned from the Microsoft SOC—Part 2a: Organizing people

Read more Lessons learned from the Microsoft SOC—Part 2a: Organizing people

Recommendations for deploying the latest Attack surface reduction rules for maximum impact

Read more Recommendations for deploying the latest Attack surface reduction rules for maximum impact

Lessons learned from the Microsoft SOC—Part 1: Organization

Read more Lessons learned from the Microsoft SOC—Part 1: Organization

Why the Pipeline Cybersecurity Initiative is a critical step

Read more Why the Pipeline Cybersecurity Initiative is a critical step

Announcing the new Security Engineering website

Read more Announcing the new Security Engineering website

The evolution of Microsoft Threat Protection, January update

Read more The evolution of Microsoft Threat Protection, January update

The AI cybersecurity impact for IoT

Read more The AI cybersecurity impact for IoT

Zero Trust part 1: Identity and access management

Read more Zero Trust part 1: Identity and access management

What’s new in Windows Defender ATP

Read more What’s new in Windows Defender ATP

The evolution of Microsoft Threat Protection, November update

Read more The evolution of Microsoft Threat Protection, November update

CISO series: Lessons learned—4 priorities to achieve the largest security improvements

Read more CISO series: Lessons learned—4 priorities to achieve the largest security improvements

CISO series: Build in security from the ground up with Azure enterprise

Read more CISO series: Build in security from the ground up with Azure enterprise