Get deeper into security at Microsoft Ignite 2018
This year at Ignite, Microsoft announces exciting innovations in identity management, information protection, threat protection, security management, and more.
This year at Ignite, Microsoft announces exciting innovations in identity management, information protection, threat protection, security management, and more.
How can we build the SOC of tomorrow? By respecting the law of data gravity. If we can perform security analytics close to where the data already is, we can increase the speed of response.
This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this blog, we explain how Microsoft 365 threat protection solutions interoperate threat detection across these attack vectors.
Each year more and more governments are developing policies to address security challenges presented by an increasingly digitized world. We are excited to announce the release of Microsoft’s new Cybersecurity Policy Framework—an indispensable resource for the policymakers joining this work.
First in a three part series that provides an in-depth look at how Microsoft 365 Security integrates into the broader cybersecurity industry.
This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization. Check out our last blog Getting the most value out of your security deployment.
This post is authored by Cyril Voisin, Chief Security Advisor, Enterprise Cybersecurity Group. Nowadays every company is becoming a digital company to some extent. Digital transformation changes the way business is done.
The Microsoft Cybersecurity Reference Architecture describes Microsoft’s cybersecurity capabilities and how they integrate with existing security architectures and capabilities.
If we’ve learned anything from the rise of Marvel Cinematic Universe, it’s that good things tend to happen when heroes intervene. For securing new applications, this metaphor is a useful one because security isn’t always top-of-mind for scrum teams, nor is it always conducive to meeting aggressive deadlines.
This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series, you’ll find context, answers, and guidance for deployment and driving adoption within your organization. Check out our last blog First Things First: Envisioning Your Security Deployment.
This blog post is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 Security solutions. In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization. Check out our last blog Accelerate your security deployment with FastTrack for Microsoft 365.
This post is authored by Debraj Ghosh, Senior Product Marketing Manager, Microsoft 365 Security.