Skip to main content
Skip to main content
Microsoft
Microsoft Security
Microsoft Security
Microsoft Security
Home
Solutions
Cloud security
Control and manage access
Information protection & governance
Ransomware
Secure remote work
Risk management
SIEM & XDR
Small & medium business
Zero Trust
Products
Identity & access management
Identity & access management
Azure Active Directory
CloudKnox Permissions Management
Verifiable credentials in Azure AD
Azure Key Vault
SIEM & XDR
SIEM & XDR
Microsoft Sentinel
Microsoft Defender for Cloud
Microsoft 365 Defender
Microsoft Defender for Endpoint
Microsoft Defender for Office 365
Microsoft Defender for Identity
Microsoft Defender for Cloud Apps
Microsoft Defender Vulnerability Management
Cloud Security
Cloud Security
Microsoft Defender for Cloud
Azure Firewall
Azure Web App Firewall
Azure DDoS Protection
GitHub Advanced Security
Endpoint security
Endpoint security
Microsoft 365 Defender
Microsoft Defender for Endpoint
Microsoft Defender for IoT
Microsoft Defender for Business
Microsoft Defender Vulnerability Management
Identity Threat Protection
Identity Threat Protection
Microsoft Defender for Identity
Azure AD Identity Protection
Risk Management & Privacy
Risk Management & Privacy
Microsoft Purview Overview
Microsoft Purview Insider Risk Management
Microsoft Purview Communication Compliance
Microsoft Purview eDiscovery
Microsoft Purview Compliance Manager
Microsoft Priva Risk Management
Information Protection
Information Protection
Microsoft Purview Overview
Microsoft Purview Information Protection
Microsoft Purview Data Lifecycle Management
Microsoft Purview Data Loss Prevention
Device Management
Device Management
Microsoft Endpoint Manager
Services
Partners
Resources
Get started
Get started
Customer stories
Security 101
Product trials
How we protect Microsoft
Reports and analysis
Reports and analysis
Microsoft Security Insider
Microsoft Digital Defense Report
Security Response Center
Community
Community
Microsoft Security Blog
Microsoft Security Events
Microsoft Tech Community
Documentation and training
Documentation and training
Documentation
Technical Content Library
Training & certifications
Additional sites
Additional sites
Microsoft Trust Center
Security Engineering Portal
Service Trust Portal
Contact sales
More
Start free trial
All Microsoft
Microsoft Security
Azure
Dynamics 365
Microsoft 365
Microsoft Teams
Windows 365
Tech & innovation
Tech & innovation
Microsoft Cloud
AI
Azure Space
Mixed reality
Microsoft HoloLens
Microsoft Viva
Quantum computing
Sustainability
Industries
Industries
Education
Automotive
Financial services
Government
Healthcare
Manufacturing
Retail
All industries
Partners
Partners
Find a partner
Become a partner
Partner Network
Find an advertising partner
Become an advertising partner
Azure Marketplace
AppSource
Resources
Resources
Blog
Microsoft Advertising
Developer Center
Documentation
Events
Licensing
Microsoft Learn
Microsoft Research
View Sitemap
Search
Search Microsoft Security
Cancel
Sign in
Tips & Talk
Featured image for 6 strategies to reduce cybersecurity alert fatigue in your SOC
February 17, 2021
• 5 min read
6 strategies to reduce cybersecurity alert fatigue in your SOC
Alert fatigue is a top of mind challenge when it comes to security monitoring. As a result, organizations are constantly trying to improve their human capabilities, processes, and technology to address the challenge. Microsoft is uniquely positioned to take on this problem by tapping into the end-to-end capabilities of our Extended detection and response (XDR) offering that doesn’t just span the key security domains of concern but is also tightly integrated across those domains and powered by intelligence.
Read more
6 strategies to reduce cybersecurity alert fatigue in your SOC
Featured image for Are students prepared for real-world cyber curveballs?
September 12, 2019
• 3 min read
Are students prepared for real-world cyber curveballs?
Are today’s students getting the preparation they need to do the cybersecurity work of tomorrow? Read the findings from the U.S. Department of Energy (DOE) CyberForce Competition.™
Read more
Are students prepared for real-world cyber curveballs?
Featured image for Beyond the buzzwords
August 29, 2019
• 5 min read
Beyond the buzzwords
Security vendors and professionals often use complex words and terminology to describe simple concepts. Here are few guidelines to consider when naming or describing your products, services, and features.
Read more
Beyond the buzzwords
August 16, 2018
• 5 min read
Partnering with the industry to minimize false positives
Every day, antivirus capabilities in Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) protect millions of customers from threats. To effectively scale protection, Microsoft Defender ATP uses intelligent systems that combine multiple layers of machine learning models, behavior-based detection algorithms, generics, and heuristics that make a verdict on suspicious files, most of the time in…
Read more
Partnering with the industry to minimize false positives
May 15, 2018
• 4 min read
Use Windows Information Protection (WIP) to help make accidental data leakage a thing of the past
Windows Information Protection (WIP) is an out-of-the box data leakage prevention feature for Windows 10 that can automatically apply protection for work files and data to prevent accidental data leakage.
Read more
Use Windows Information Protection (WIP) to help make accidental data leakage a thing of the past
Featured image for Building a world without passwords
May 1, 2018
• 5 min read
Building a world without passwords
In this blog post, we will provide a brief insight into how we at Microsoft think about solving this problem, along with details on solutions that you can try out today.
Read more
Building a world without passwords
April 20, 2018
• 5 min read
Teaming up in the war on tech support scams
Beyond customer education, the scale and complexity of tech support scams require cooperation and broad partnerships across the industry. Given the scale and complexity of tech support scams, how can the security industry at large work together to deal a major blow to this enduring threat?
Read more
Teaming up in the war on tech support scams
Featured image for SSN for authentication is all wrong
October 23, 2017
• 4 min read
SSN for authentication is all wrong
Unless you were stranded on a deserted island or participating in a zen digital fast chances are you’ve heard plenty about the massive Equifax breach and the head-rolling fallout. In the flurry of headlines and advice about credit freezes an important part of the conversation was lost: if we didn’t misuse our social security numbers,…
Read more
SSN for authentication is all wrong
Featured image for Been shopping lately? Fake credit card email can spook you into downloading Cerber ransomware
December 13, 2016
• 6 min read
Been shopping lately? Fake credit card email can spook you into downloading Cerber ransomware
As the shopping sprees become increasingly frenetic during holiday season, it’s hard not to worry about how much credit card debt we’re piling. Some of us rely on email notifications from our banks to track the damage to our finances. So what happens when we suddenly get notified about charges for things we never bought?…
Read more
Been shopping lately? Fake credit card email can spook you into downloading Cerber ransomware
Featured image for Windows 10: protection, detection, and response against recent Depriz malware attacks
December 9, 2016
• 5 min read
Windows 10: protection, detection, and response against recent Depriz malware attacks
A few weeks ago, multiple organizations in the Middle East fell victim to targeted and destructive attacks that wiped data from computers, and in many cases rendering them unstable and unbootable. Destructive attacks like these have been observed repeatedly over the years and the Windows Defender and Windows Defender Advanced Threat Protection Threat Intelligence teams…
Read more
Windows 10: protection, detection, and response against recent Depriz malware attacks
1
2
3
…
70
Next Page