


Security management
Learn how our identity-driven security solutions protect people, devices, and data from potential vulnerabilities at every touchpoint, everywhere they work.
Refine results
Topic
Products and services
Publish date
-
The pandemic is exposing weaknesses in cybersecurity—learn why an integrated security solution can help combat emerging cyber threats.
-
4 ways Microsoft is delivering security for all in a Zero Trust world
Today we’re excited to share with you several new innovations across four key areas—identity, security, compliance, and skilling—to give you the holistic security protection you need to meet today’s most challenging security demands. -
International Women’s Day: How to support and grow women in cybersecurity
Today, March 8, we are proud to celebrate International Women’s Day. -
Secure containerized environments with updated threat matrix for Kubernetes
The updated threat matrix for Kubernetes adds new techniques found by Microsoft researchers, as well as techniques that were suggested by the community. -
Threat matrix for storage services
Storage services are one of the most popular services in the cloud. -
Afternoon Cyber Tea: Cybersecurity has become a pillar of the business
Information security researcher and author Tarah Wheeler talks with Microsoft’s Ann Johnson about the growing role of cybersecurity as a pillar of the business. -
Afternoon Cyber Tea: Cybersecurity challenged to meet diversity goals
RevolutionCyber Founder and CEO Jules Okafor shares what organizations can do to tackle business challenges and support diversity in cybersecurity. -
CRSP: The emergency team fighting cyber attacks beside customers
CRSP is a worldwide team of cybersecurity experts operating in most countries, across all organizations, with deep expertise to secure an environment post-security breach and to help you prevent a breach in the first place. -
How purple teams can embrace hacker culture to improve security
Hacker House co-founder and CEO Matthew Hickey introduces the concept of purple teaming and how a purple team can benefit an organization. -
Strategies, tools, and frameworks for building an effective threat intelligence team
Red Canary Director of Intelligence Katie Nickels shares her thoughts on strategies, tools, and frameworks to build an effective threat intelligence team. -
Windows 11 enables security by design from the chip to the cloud
Over the last year, PCs have kept us connected to family, friends, and enabled businesses to continue to run. -
Encouraging women to embrace their cybersecurity superpowers
The cybersecurity challenges of today require a diversity of skills, perspectives, and experiences, yet women remain underrepresented in this field.