

Microsoft Defender
Microsoft Defender helps prevent, detect, and respond to attacks across devices, identities, apps, email, data, workloads, and clouds. Explore threat intelligence, capabilities, and real-world guidance to help you get more out of Defender.
Refine results
Topic
Products and services
Publish date
-
OneDrive for Business can help ensure that business files for organizations’ users are stored in a central location making it easy for users to search, share and collaborate on documents using a range of devices.
-
Microsoft Cloud App Security is generally available
Today, we are announcing that Microsoft Cloud App Security is now generally available as the latest addition to the secure platform we are building at Microsoft. -
FedRAMP High: Trust is cloud security validated
The latest Government Office of Accountability report dealing with the security of high impact information technology (IT) systems continues to point out opportunities for improvement in cybersecurity across the US Federal Government. -
New Microsoft Azure Security Capabilities Now Available
In November, Microsoft CEO Satya Nadella outlined a new comprehensive, cross company approach to security for our mobile-first, cloud-first world. -
Securing the Internet of Things: Introducing the Security Program for Azure IoT
This post is authored by Sam George, Partner Director Program Management, Azure IoT As the Internet of Things (IoT) continues to gain traction in the enterprise, questions of security and privacy are top of mind for business decision makers, executives and IT alike. -
Our commitment to our customers’ security
Windows is the only platform with a customer commitment to investigate reported security issues and proactively update impacted devices as soon as possible. -
Azure Backup protects against ransomware
According to the most recent CRN Quarterly Ransomware Report, malicious infrastructure attacks increased 3500% in 2016 and the percentage is expected to increase in 2017. -
Cybersecurity’s perfect storm
The unprecedented scale and sophistication of modern cyberthreats, combined with the rapidly disappearing IT perimeter, means that while preventing an attack from becoming a breach is ideal, it is no longer realistic. -
World Backup Day is as good as any to back up your data
In today’s security landscape, there are more threats to data than ever before. -
The two-pronged approach to detecting persistent adversaries
Advanced Persistent Threats use two primary methods of persistence: compromised endpoints and compromised credentials. -
Use Enterprise Threat Detection to find “invisible” cyberattacks
This post is authored by Roberto Bamberger, Principal Consultant, Enterprise Cybersecurity Group. -
How the Asia-Pacific region is advancing cybersecurity
Earlier this year, my team and I had the great privilege and pleasure of spending several days in Japan, participating in the Information Technology Promotion Agency (IPA) Symposium.