5 principles driving a customer-obsessed identity strategy at Microsoft

Read more 5 principles driving a customer-obsessed identity strategy at Microsoft

Here is Homeland Security, black swans, and thwarted cyberattacks

Read more Here is Homeland Security, black swans, and thwarted cyberattacks

Building a world without passwords

Read more Building a world without passwords

First things first: Envisioning your security deployment

Read more First things first: Envisioning your security deployment

Overview of Petya, a rapid cyberattack

Read more Overview of Petya, a rapid cyberattack

How to disrupt attacks caused by social engineering

Read more How to disrupt attacks caused by social engineering

Application fuzzing in the era of Machine Learning and AI

Read more Application fuzzing in the era of Machine Learning and AI

New tech support scam launches communication or phone call app

Read more New tech support scam launches communication or phone call app

Windows Defender Exploit Guard: Reduce the attack surface against next-generation malware

Read more Windows Defender Exploit Guard: Reduce the attack surface against next-generation malware

Introducing Windows Defender Application Control

Read more Introducing Windows Defender Application Control

Stopping ransomware where it counts: Protecting your data with Controlled folder access

Read more Stopping ransomware where it counts: Protecting your data with Controlled folder access

Microsoft and Progeny Systems enhance security for mobile applications across U.S. Government

Read more Microsoft and Progeny Systems enhance security for mobile applications across U.S. Government

Easily create securely configured virtual machines

Read more Easily create securely configured virtual machines