For important security features on Windows to properly do their jobs, the platform’s firmware and hardware must be trustworthy and healthy. Learn about Secure Launch, which leverages the principle of Dynamic Root of Trust for Measurement (DRTM), and System Management Mode (SMM) protection.Read more Force firmware code to be measured and attested by Secure Launch on Windows 10
A diverse cybersecurity team will help you generate the innovative ideas you need to confront today and tomorrow’s cyber threats.Read more Microsoft Security: How to cultivate a diverse cybersecurity team
Technical skills aren’t enough. To be a strategic cybersecurity advisor at the executive level, CISOs need strong risk management and communication skills.Read more Microsoft Security: What cybersecurity skills do I need to become a CISO?
Leverage Microsoft Cloud App Security to secure your digital transformation, by protecting all your apps and resources with the principles of Zero Trust.Read more Microsoft Zero Trust deployment guide for your applications
Featured image for Stopping Active Directory attacks and other post-exploitation behavior with AMSI and machine learning
Stopping Active Directory attacks and other post-exploitation behavior with AMSI and machine learning
Microsoft Defender ATP leverages AMSI’s visibility into scripts and harnesses the power of machine learning to detect and stop post-exploitation activities that largely rely on scripts.Read more Stopping Active Directory attacks and other post-exploitation behavior with AMSI and machine learning
As IoT is revolutionizing industries, CISOs need to rethink how they approach data protection in order to effectively employ risk mitigation.Read more Rethinking IoT/OT Security to Mitigate Cyberthreats
The true costs from phishing may be higher than you think. Microsoft Threat Protection can help you mitigate your risk.Read more How can Microsoft Threat Protection help reduce the risk from phishing?
Featured image for How do I implement a Zero Trust security model for my Microsoft remote workforce?
A Zero Trust strategy grounded in digital empathy will allow you to better protect your mobile workforce.Read more How do I implement a Zero Trust security model for my Microsoft remote workforce?
Corrata’s Microsoft Cloud App Security integration addresses risk mitigation through endpoint-based discovery and control for cloud apps.Read more Microsoft and Corrata integrate to extend cloud app security to mobile endpoints
TLS 1.3 eliminates obsolete cryptographic algorithms, enhances security over older versions, and aims to encrypt as much of the handshake as possible.Read more Taking Transport Layer Security (TLS) to the next level with TLS 1.3
Gartner has listed Microsoft as a Leader in its 2020 Magic Quadrant for Unified Endpoint Management.Read more Gartner announces the 2020 Magic Quadrant for Unified Endpoint Management