


Security management
Learn how our identity-driven security solutions protect people, devices, and data from potential vulnerabilities at every touchpoint, everywhere they work.
Refine results
Topic
Products and services
Publish date
-
Microsoft is pleased to announce the publication of the Security Stack Mappings for Azure project in partnership with the Center for Threat-Informed Defense.
-
Microsoft at Black Hat 2021: Sessions, bug bounty updates, product news, and more
Get previews of Microsoft’s latest security solutions, information on virtual sessions, and more for Black Hat 2021. -
Cybersecurity’s next fight: How to protect employees from online harassment
Tall Poppy CEO and Co-founder Leigh Honeywell talks with Microsoft about how companies can support employees who have been targeted for online harassment. -
Microsoft a Leader in 2021 Gartner® Magic Quadrant™ for Unified Endpoint Management Tools
Adapting to the evolving business landscape, organizations increasingly depend on Microsoft Endpoint Manager to enable hybrid work—where the endpoint is the new workplace. -
Why diversity is important for a strong cybersecurity team
LinkedIn Chief Information Security Officer Geoff Belknap talks with Microsoft’s Bret Arsenault about recruiting cybersecurity talent and solving the skills gap. -
Get career advice from 7 inspiring leaders in cybersecurity
In this blog, top experts in the industry will share insights on their careers in cybersecurity. -
Protect your business with Microsoft Security’s comprehensive protection
Securing an organization has never been simple. -
How to assess and improve the security culture of your business
Cygenta Co-Founder and Co-Chief Executive Officer Dr. -
Improve kernel security with the new Microsoft Vulnerable and Malicious Driver Reporting Center
Windows 10 and Windows 11 have continued to raise the security bar for drivers running in the kernel. -
Build a stronger cybersecurity team through diversity and training
Heath Adams, Chief Executive Officer at TCM Security, offers practical advice on how to build a security team. -
Celebrating 20 Years of Trustworthy Computing
20 years ago this week, Bill Gates sent a now-famous email to all Microsoft employees announcing the creation of the Trustworthy Computing (TwC) initiative. -
Detect active network reconnaissance with Microsoft Defender for Endpoint
Active network reconnaissance is a critical component of the cybersecurity kill chain allowing for network topography and endpoint services to be mapped and used in targeted campaigns.