

Security management
Learn how our identity-driven security solutions protect people, devices, and data from potential vulnerabilities at every touchpoint, everywhere they work.
Refine results
Topic
Products and services
Publish date
-
With the U.S. midterm elections rapidly approaching, campaigns must be vigilant in protecting against cyberattacks to their online collaboration tools, including email.
-
CISO series: Lessons learned—4 priorities to achieve the largest security improvements
In this blog, Jonathan Trull shares methods he uses to prioritize where and how he spends his resources to achieve the largest security improvements. -
CISO series: Strengthen your organizational immune system with cybersecurity hygiene
Cybersecurity hygiene is about maintaining cyberhealth by developing and implementing a set of tools, policies, and practices to increase your organization’s resiliency in the face of attacks and exploits. -
Guide to Developing a National Cybersecurity Strategy—a resource for policymakers to respond to cybersecurity challenges
Multi-stakeholder collaboration helps to build better security policies in the recently released Guide to Developing a National Cybersecurity Strategy. -
CISO Series: Lessons learned from the Microsoft SOC—Part 1: Organization
In the first of our three part series, we provide tips on how to manage a security operations center (SOC) to be more responsive, effective, and collaborative. -
Microsoft Security Intelligence Report Volume 24 is now available
Download the Microsoft Security Intelligence Report Volume 24 and check out the brand new interactive security insights to dig into the latest security trends. -
Securing your digital transformation
A recent Forrester study, titled “Security Through Simplicity,” found a correlation between vendor consolidation and strategy modernization to reduce security complexity. -
Announcing Microsoft Defender ATP for Mac and new Threat and Vulnerability Management capabilities
Today at Ignite Amsterdam, we’re excited to announce two additions to our endpoint security platform. -
Announcing the Microsoft Graph Security Hackathon winners
We asked Microsoft Graph Security Hackathon participants to come up with innovative solutions using the Microsoft Graph Security API, and they did not disappoint. -
Secure access to your enterprise with Microsoft 365
User access can be simpler for your users and more secure for the enterprise. -
CISO Series: Lessons learned from the Microsoft SOC—Part 2a: Organizing people
In the second of our three-part series, we focus on the most valuable resource in the SOC—our people. -
Understand and improve your security posture with Microsoft 365
Instill confidence in your board with a stronger security posture.