Lessons learned from the Microsoft SOC Part 2b: Career paths and readiness

Read more Lessons learned from the Microsoft SOC Part 2b: Career paths and readiness

UK launches cyberstrategy with long-term relevance

Read more UK launches cyberstrategy with long-term relevance

Guide to Developing a National Cybersecurity Strategy—a resource for policymakers to respond to cybersecurity challenges

Read more Guide to Developing a National Cybersecurity Strategy—a resource for policymakers to respond to cybersecurity challenges

The challenges of adopting a consistent cybersecurity framework in the insurance industry

Read more The challenges of adopting a consistent cybersecurity framework in the insurance industry

CISO series: Partnering with the C-Suite on cybersecurity

Read more CISO series: Partnering with the C-Suite on cybersecurity

CISO series: Building a security-minded culture starts with talking to business managers

Read more CISO series: Building a security-minded culture starts with talking to business managers

Delivering security innovation that puts Microsoft’s experience to work for you

Read more Delivering security innovation that puts Microsoft’s experience to work for you

Protecting user identities

Read more Protecting user identities

Protecting the protector: Hardening machine learning defenses against adversarial attacks

Read more Protecting the protector: Hardening machine learning defenses against adversarial attacks

Building on experience: a framework for cybersecurity policy

Read more Building on experience: a framework for cybersecurity policy

Attending Black Hat USA 2018? Here’s what to expect from Microsoft.

Read more Attending Black Hat USA 2018? Here’s what to expect from Microsoft.

Be like a Moomin: How to establish trust between competitors so we can fight cybercrime

Read more Be like a Moomin: How to establish trust between competitors so we can fight cybercrime

Updating your cybersecurity strategy to enable and accelerate digital transformation

Read more Updating your cybersecurity strategy to enable and accelerate digital transformation