Guiding principles of our identity strategy: staying ahead of evolving customer needs

Read more Guiding principles of our identity strategy: staying ahead of evolving customer needs

Data governance and retention in your Microsoft 365 tenant—a secure and highly capable solution

Read more Data governance and retention in your Microsoft 365 tenant—a secure and highly capable solution

Guarding against supply chain attacks—Part 1: The big picture

Read more Guarding against supply chain attacks—Part 1: The big picture

Foundations of Flow—secure and compliant automation, part 2

Read more Foundations of Flow—secure and compliant automation, part 2

3 strategies for building an information protection program

Read more 3 strategies for building an information protection program

CISO series: Talking cybersecurity with the board of directors

Read more CISO series: Talking cybersecurity with the board of directors

How to help maintain security compliance

Read more How to help maintain security compliance

CISO series: Build in security from the ground up with Azure enterprise

Read more CISO series: Build in security from the ground up with Azure enterprise

Ignite 2018 highlights: password-less sign-in, confidential computing, new threat protection, and more

Read more Ignite 2018 highlights: password-less sign-in, confidential computing, new threat protection, and more

Here is Homeland Security, black swans, and thwarted cyberattacks

Read more Here is Homeland Security, black swans, and thwarted cyberattacks

IGF proves the value of bottom-up, multi-stakeholder model in cyberspace policy-making

Read more IGF proves the value of bottom-up, multi-stakeholder model in cyberspace policy-making

Minimize cybersecurity risk with Software Asset Management

Read more Minimize cybersecurity risk with Software Asset Management

SSN for authentication is all wrong

Read more SSN for authentication is all wrong