Skip to main content
Skip to main content
Security

Microsoft Digital Defense Report 2020: Cyber Threat Sophistication on the Rise

Read more Microsoft Digital Defense Report 2020: Cyber Threat Sophistication on the Rise

Inside Microsoft Threat Protection: Attack modeling for finding and stopping lateral movement

Read more Inside Microsoft Threat Protection: Attack modeling for finding and stopping lateral movement

Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk

Read more Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk

Microsoft works with healthcare organizations to protect from popular ransomware during COVID-19 crisis: Here’s what to do

Read more Microsoft works with healthcare organizations to protect from popular ransomware during COVID-19 crisis: Here’s what to do

Latest Astaroth living-off-the-land attacks are even more invisible but not less observable

Read more Latest Astaroth living-off-the-land attacks are even more invisible but not less observable

Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks

Read more Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks

Human-operated ransomware attacks: A preventable disaster

Read more Human-operated ransomware attacks: A preventable disaster

Top 10 security steps in Microsoft 365 that political campaigns can take today

Read more Top 10 security steps in Microsoft 365 that political campaigns can take today

Attack inception: Compromised supply chain within a supply chain poses new risks

Read more Attack inception: Compromised supply chain within a supply chain poses new risks

Virtualization-based security (VBS) memory enclaves: Data protection through isolation

Read more Virtualization-based security (VBS) memory enclaves: Data protection through isolation