Lessons learned from the Microsoft SOC Part 2b: Career paths and readiness

Read more Lessons learned from the Microsoft SOC Part 2b: Career paths and readiness

Recommendations for deploying the latest Attack surface reduction rules for maximum impact

Read more Recommendations for deploying the latest Attack surface reduction rules for maximum impact

Lessons learned from the Microsoft SOC—Part 1: Organization

Read more Lessons learned from the Microsoft SOC—Part 1: Organization

The evolution of Microsoft Threat Protection, February update

Read more The evolution of Microsoft Threat Protection, February update

Securing the future of AI and machine learning at Microsoft

Read more Securing the future of AI and machine learning at Microsoft

Announcing the new Security Engineering website

Read more Announcing the new Security Engineering website

The evolution of Microsoft Threat Protection, January update

Read more The evolution of Microsoft Threat Protection, January update

The AI cybersecurity impact for IoT

Read more The AI cybersecurity impact for IoT

Step 1. Identify users: top 10 actions to secure your environment

Read more Step 1. Identify users: top 10 actions to secure your environment

Insights from the MITRE ATT&CK-based evaluation of Windows Defender ATP

Read more Insights from the MITRE ATT&CK-based evaluation of Windows Defender ATP

Kicking off the Microsoft Graph Security Hackathon

Read more Kicking off the Microsoft Graph Security Hackathon

Analysis of cyberattack on U.S. think tanks, non-profits, public sector by unidentified attackers

Read more Analysis of cyberattack on U.S. think tanks, non-profits, public sector by unidentified attackers

CISO series: Secure your privileged administrative accounts with a phased roadmap

Read more CISO series: Secure your privileged administrative accounts with a phased roadmap