Lessons learned from the Microsoft SOC Part 2b: Career paths and readiness

Read more Lessons learned from the Microsoft SOC Part 2b: Career paths and readiness

FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines

Read more FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines

Overview of Petya, a rapid cyberattack

Read more Overview of Petya, a rapid cyberattack

IGF proves the value of bottom-up, multi-stakeholder model in cyberspace policy-making

Read more IGF proves the value of bottom-up, multi-stakeholder model in cyberspace policy-making

Microsoft offers several mechanisms to protect against ransomware

Read more Microsoft offers several mechanisms to protect against ransomware

How to disrupt attacks caused by social engineering

Read more How to disrupt attacks caused by social engineering

Windows Defender ATP machine learning and AMSI: Unearthing script-based attacks that ‘live off the land’

Read more Windows Defender ATP machine learning and AMSI: Unearthing script-based attacks that ‘live off the land’

Defending against ransomware using system design

Read more Defending against ransomware using system design

Windows Defender Exploit Guard: Reduce the attack surface against next-generation malware

Read more Windows Defender Exploit Guard: Reduce the attack surface against next-generation malware

Stopping ransomware where it counts: Protecting your data with Controlled folder access

Read more Stopping ransomware where it counts: Protecting your data with Controlled folder access

Cybersecurity in a modern age

Read more Cybersecurity in a modern age

Advanced Threat Analytics security research network technical analysis: NotPetya

Read more Advanced Threat Analytics security research network technical analysis: NotPetya

Stepping up protection with intelligent security

Read more Stepping up protection with intelligent security