Corporate Governance scoring is increasingly important to boards of directors, executive leadership, and the investment community. Governance frameworks now incorporate aspects of IT security. Co...
The threat landscape has changed over the last few years. A mitigation strategy involves collaboration between the security operations and IT infrastructure teams. There are three best practices ...
Microsoft Defender Experts for Hunting is now generally available. The security offering provides a proactive hunting service combining expert-trained technology with human-led services to hunt f...
Defenders are up against the most sophisticated threat landscape we’ve ever seen. Today, we’re proud to execute our threat intelligence vision behind that acquisition and announce several new...
Chief Executive Officer and owner of Ampere Industrial Security Patrick C. Miller discusses the security and hiring challenges of protecting industrial systems. The post Industrial systems: Wha...
MSTIC and MSRC disclose technical details of a private-sector offensive actor (PSOA) tracked as KNOTWEED using multiple Windows and Adobe 0-day exploits, including one for the recently patched CV...
Attackers are increasingly leveraging managed IIS extensions as covert backdoors into servers, providing a durable persistence mechanism for attacks. The post Malicious IIS extensions quietly o...
Microsoft Partner Director of Identity Security Alex Weinert talks with Nitika Gupta, a Microsoft Principal Product Manager who leads the team responsible for enterprise admin capabilities for id...
Just like our customers, Microsoft has been on a compliance journey. Here’s what we’ve learned about the most effective mindset and tools to manage compliance. The post Discover 5 lessons M...
We are excited to announce the general availability of the new Microsoft Graph APIs for Microsoft Purview eDiscovery. With the new Microsoft Purview eDiscovery APIs, partners and customers can le...