CISO series: Lessons learned from the Microsoft SOC—Part 3b: A day in the life
In this next post in our series, we provide insight into a day in the life of our SOC analysts investigating common front door attacks.
In this next post in our series, we provide insight into a day in the life of our SOC analysts investigating common front door attacks.
It’s complex work to define a security strategy for IoT—especially with a 3-million-person shortage of cybersecurity pros. But there is a way to augment existing security teams and resources.
Microsoft published a series of materials that define common vocabulary that can be used to describe intentional and unintentional failures.
Learn how Check Point CloudGuard IaaS provides an added layer of security for Azure and aligns with Azure security’s best practices.
What should IT and security teams be looking for in an email security solution to protect all their users, from frontline workers to the C-suite? Here are 6 tips to ensure your organization has a strong email security posture.
Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC.
One of the best ways to thwart cybercrime is to involve security experts before deploying new products and services.
In the next post of our series, we provide tips on choosing technology to help a security operations center (SOC) be more responsive, effective, and collaborative.
DMARC security protocol helps you take control of who can send email messages on your behalf, eliminating the ability for cybercriminals to use your domain to send their illegitimate messages.
We explore five use cases for CASBs that give you an immediate return on your investment with very little deployment effort.
In part 2 of our two-part series, we go deeper into how Microsoft Flow secures your users and data, as well as enhances the IT experience.
Security vendors and professionals often use complex words and terminology to describe simple concepts. Here are few guidelines to consider when naming or describing your products, services, and features.