Lessons learned from the Microsoft SOC Part 2b: Career paths and readiness

Read more Lessons learned from the Microsoft SOC Part 2b: Career paths and readiness

4 best practices to help you integrate security into DevOps

Read more 4 best practices to help you integrate security into DevOps

Step 10. Detect and investigate security incidents: top 10 actions to secure your environment

Read more Step 10. Detect and investigate security incidents: top 10 actions to secure your environment

Demystifying Password Hash Sync

Read more Demystifying Password Hash Sync

Ovum recommends Microsoft security to safeguard your hybrid and multi cloud environments

Read more Ovum recommends Microsoft security to safeguard your hybrid and multi cloud environments

Identity enhancements to support the more than 1 million active third-party applications on our platform

Read more Identity enhancements to support the more than 1 million active third-party applications on our platform

Building the security operations center of tomorrow—better insights with compound detection

Read more Building the security operations center of tomorrow—better insights with compound detection

Step 8. Protect your documents and email: top 10 actions to secure your environment

Read more Step 8. Protect your documents and email: top 10 actions to secure your environment

Secure access to your enterprise with Microsoft 365

Read more Secure access to your enterprise with Microsoft 365

Helping security professionals do more, better

Read more Helping security professionals do more, better

Voice of the Customer: Azure AD helps lululemon enable productivity and security all at once for its employees

Read more Voice of the Customer: Azure AD helps lululemon enable productivity and security all at once for its employees

Microsoft gains strong customer and analyst momentum in the Cloud Access Security Brokers (CASB) market

Read more Microsoft gains strong customer and analyst momentum in the Cloud Access Security Brokers (CASB) market

The challenges of adopting a consistent cybersecurity framework in the insurance industry

Read more The challenges of adopting a consistent cybersecurity framework in the insurance industry