Detecting stealthier cross-process injection techniques with Windows Defender ATP: Process hollowing and atom bombing

Read more Detecting stealthier cross-process injection techniques with Windows Defender ATP: Process hollowing and atom bombing

Windows 10 platform resilience against the Petya ransomware attack

Read more Windows 10 platform resilience against the Petya ransomware attack

A Week in The Hague: The Global Conference on Cyberspace (GCCS)

Read more A Week in The Hague: The Global Conference on Cyberspace (GCCS)

Microsoft partners with cities and governments to improve cybersecurity for citizens

Read more Microsoft partners with cities and governments to improve cybersecurity for citizens

Six Proposed Norms to Reduce Conflict in Cyberspace

Read more Six Proposed Norms to Reduce Conflict in Cyberspace

Dispatch from Delhi: Conference on Cyber Security and Cyber Governance

Read more Dispatch from Delhi: Conference on Cyber Security and Cyber Governance

Proposed Cybersecurity Norms to Reduce Conflict in an Internet-dependent World

Read more Proposed Cybersecurity Norms to Reduce Conflict in an Internet-dependent World

Strategies, Capacity Building and Legislative Initiatives: Cybersecurity Policy Development Battles Through “Tumultuous Teens”

Read more Strategies, Capacity Building and Legislative Initiatives: Cybersecurity Policy Development Battles Through “Tumultuous Teens”

Microsoft’s Perspective on the Cybersecurity Framework: Next Steps for Incentives and International Harmonization

Read more Microsoft’s Perspective on the Cybersecurity Framework: Next Steps for Incentives and International Harmonization

Why businesses should care about cybersecurity this October

Read more Why businesses should care about cybersecurity this October