CISO Spotlight: How diversity of data (and people) defeats today’s cyber threats

Read more CISO Spotlight: How diversity of data (and people) defeats today’s cyber threats

CISO Stressbusters: 4 tips for running a highly effective security operation

Read more CISO Stressbusters: 4 tips for running a highly effective security operation

Empower your analysts to reduce burnout in your security operations center

Read more Empower your analysts to reduce burnout in your security operations center

Recommendations for deploying the latest Attack surface reduction rules for maximum impact

Read more Recommendations for deploying the latest Attack surface reduction rules for maximum impact

CISO Series: Lessons learned from the Microsoft SOC—Part 1: Organization

Read more CISO Series: Lessons learned from the Microsoft SOC—Part 1: Organization

The evolution of Microsoft Threat Protection, February update

Read more The evolution of Microsoft Threat Protection, February update

Securing the future of AI and machine learning at Microsoft

Read more Securing the future of AI and machine learning at Microsoft

Announcing the new Security Engineering website

Read more Announcing the new Security Engineering website

The evolution of Microsoft Threat Protection, January update

Read more The evolution of Microsoft Threat Protection, January update

The AI cybersecurity impact for IoT

Read more The AI cybersecurity impact for IoT

Step 1. Identify users: top 10 actions to secure your environment

Read more Step 1. Identify users: top 10 actions to secure your environment

Insights from the MITRE ATT&CK-based evaluation of Windows Defender ATP

Read more Insights from the MITRE ATT&CK-based evaluation of Windows Defender ATP

Kicking off the Microsoft Graph Security Hackathon

Read more Kicking off the Microsoft Graph Security Hackathon