

Security management
Learn how our identity-driven security solutions protect people, devices, and data from potential vulnerabilities at every touchpoint, everywhere they work.
Refine results
Topic
Products and services
Publish date
-
A reader writes: Can I use Microsoft Security Essentials with Windows 8? No—but you don’t need to.
-
Enterprise Threat Encounters: Scenarios and Recommendations – Part 1
Many of the IT Professionals that contact our customer service and support group have common questions related to security incidents and are seeking guidance on how to mitigate threats from determined adversaries.
-
How do I know if I already have antivirus software?
If your computer is running Windows 8, you already have antivirus software. -
Reliability Series #1: Reliability vs. resilience
Whenever I speak to customers and partners about reliability I’m reminded that while objectives and priorities differ between organizations and customers, at the end of the day, everyone wants their service to work. -
Microsoft is building a global online safety community, one tweet at a time
Some say, “It takes a village to raise a child. -
Measure Twice, Cut Once, With RMA Methodology
I’ve been beating our drum for a while now about the inevitability of failure in cloud-based systems. -
How do digital youth of the “app generation” learn, communicate, and express themselves
I recently had the opportunity to speak with Katie Davis, an assistant professor from the University of Washington Information School to discuss her role and a book she co-authored called, The App Generation: How Today’s Youth Navigate Identity, Intimacy, and Imagination in a Digital World. -
Governments recognize the importance of TPM 2.0 through ISO adoption
Earlier today, the Trusted Computing Group (TCG) announced in a press release the Trusted Platform Module (TPM) 2. -
New Microsoft Enterprise Cybersecurity Group to Provide Greater Security Capabilities
We’ve worked hard to earn our customers’ trust when it comes to making their data more secure and we recently announced some significant advances in this area. -
What’s Next for EU Cybersecurity after the NIS Agreement?
After three years of intense negotiations, the EU finally reached agreement on the Network and Information Security (NIS) Directive this past December. -
Cloud Security Alliance Summit 2016: I Survived the Shark Tank
A few weeks back I had the opportunity to I speak at the Cloud Security Alliance Summit 2016 held in San Francisco, California. -
Global cybersecurity policy: Finding a balance between security and competitiveness
Over the past decade, billions around the world have benefited from the exponential growth of the online environment and associated economic opportunities.