How to recover from a security breach

Read more How to recover from a security breach

Executing on the vision of Microsoft Threat Protection

Read more Executing on the vision of Microsoft Threat Protection

Microsoft Graph Security app now available on Cortex by Palo Alto Networks

Read more Microsoft Graph Security app now available on Cortex by Palo Alto Networks

The evolution of Microsoft Threat Protection, February update

Read more The evolution of Microsoft Threat Protection, February update

The evolution of Microsoft Threat Protection, January update

Read more The evolution of Microsoft Threat Protection, January update

Tackling phishing with signal-sharing and machine learning

Read more Tackling phishing with signal-sharing and machine learning

Windows Defender ATP device risk score exposes new cyberattack, drives Conditional access to protect networks

Read more Windows Defender ATP device risk score exposes new cyberattack, drives Conditional access to protect networks

The evolution of Microsoft Threat Protection, November update

Read more The evolution of Microsoft Threat Protection, November update

Attack uses malicious InPage document and outdated VLC media player to give attackers backdoor access to targets

Read more Attack uses malicious InPage document and outdated VLC media player to give attackers backdoor access to targets

Making it real—harnessing data gravity to build the next gen SOC

Read more Making it real—harnessing data gravity to build the next gen SOC