How to organize your security team: The evolution of cybersecurity roles and responsibilities

Read more How to organize your security team: The evolution of cybersecurity roles and responsibilities

Inside Microsoft Threat Protection: Solving cross-domain security incidents through the power of correlation analytics

Read more Inside Microsoft Threat Protection: Solving cross-domain security incidents through the power of correlation analytics

Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents

Read more Inside Microsoft Threat Protection: Correlating and consolidating attacks into incidents

Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them

Read more Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them

Best security, compliance, and privacy practices for the rapid deployment of publicly facing Microsoft Power Apps intake forms

Read more Best security, compliance, and privacy practices for the rapid deployment of publicly facing Microsoft Power Apps intake forms

Lessons learned from the Microsoft SOC—Part 3d: Zen and the art of threat hunting

Read more Lessons learned from the Microsoft SOC—Part 3d: Zen and the art of threat hunting

Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

Read more Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

Exploiting a crisis: How cybercriminals behaved during the outbreak

Read more Exploiting a crisis: How cybercriminals behaved during the outbreak

Zero Trust—Part 1: Networking

Read more Zero Trust—Part 1: Networking

Blue teams helping red teams: A tale of a process crash, PowerShell, and the MITRE ATT&CK evaluation

Read more Blue teams helping red teams: A tale of a process crash, PowerShell, and the MITRE ATT&CK evaluation

Misconfigured Kubeflow workloads are a security risk

Read more Misconfigured Kubeflow workloads are a security risk

Inside Microsoft Threat Protection: Attack modeling for finding and stopping lateral movement

Read more Inside Microsoft Threat Protection: Attack modeling for finding and stopping lateral movement

Managing cybersecurity like a business risk: Part 1—Modeling opportunities and threats

Read more Managing cybersecurity like a business risk: Part 1—Modeling opportunities and threats