


Security management
Learn how our identity-driven security solutions protect people, devices, and data from potential vulnerabilities at every touchpoint, everywhere they work.
Refine results
Topic
Products and services
Publish date
-
This Women’s History Month serves as a crucial moment for us to lead and continue to pave the way for a more inclusive future.
-
Hear from Microsoft Security experts at these top cybersecurity events in 2025
Security events offer a valuable opportunity to learn about the latest trends and solutions, evolve your skills for cyberthreats, and meet like-minded security professionals. -
3 priorities for adopting proactive identity and access security in 2025
Adopting proactive defensive measures is the only way to get ahead of determined efforts to compromise identities and gain access to your environment. -
3 takeaways from red teaming 100 generative AI products
Since 2018, Microsoft’s AI Red Team has probed generative AI products for critical safety and security vulnerabilities. -
Why security teams rely on Microsoft Defender Experts for XDR for managed detection and response
Microsoft Defender Experts for XDR is a mature and proven service that triages, investigates, and responds to incidents and hunts for threats on a customer’s behalf around the clock. -
Foundry study highlights the benefits of a unified security platform in new e-book
Microsoft commissioned Foundry to conduct a study to understand the current state of threat protection. -
AI innovations for a more secure future unveiled at Microsoft Ignite
Company delivers advances in AI and posture management, unprecedented bug bounty program, and updates on its Secure Future Initiative. -
DoD Zero Trust Strategy proves security benchmark years ahead of schedule with Microsoft collaboration
The Navy implementation scored a 100 percent success rate, meeting DoD requirements on all 91 Target-Level activities tested. -
Zero Trust Workshop: Advance your knowledge with an online resource
As part of Microsoft’s ongoing efforts to support security modernization and the Zero Trust principles, we’ve launched Zero Trust Workshop, an online self-service resource. -
Microsoft’s guidance to help mitigate Kerberoasting
Kerberoasting, a well-known Active Directory (AD) attack vector, enables threat actors to steal credentials and navigate through devices and networks. -
Cybersecurity Awareness Month: Securing our world—together
To help our global cyberdefenders, Microsoft has put together the Be Cybersmart Kit, designed to educate everyone, on best practices for going passwordless, not falling for sophisticated phishing or fraud, device protection, AI safety, and more. -
How comprehensive security simplifies the defense of your digital estate
End-to-end security is a modern, comprehensive approach to data protection that aligns data protection and incident response across devices, systems, and users.