Gartner has again recognized Microsoft as a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms, positioned highest on the Ability to Execute. The post Microsoft is named a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint…
Category: Microsoft Security Blog
Microsoft is named a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
Gartner has again recognized Microsoft as a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms, positioned highest on the Ability to Execute. The post Microsoft is named a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint…
Microsoft is named a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
Gartner has again recognized Microsoft as a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms, positioned highest on the Ability to Execute. The post Microsoft is named a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint…
Microsoft is named a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
Gartner has again recognized Microsoft as a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms, positioned highest on the Ability to Execute. The post Microsoft is named a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint…
Microsoft is named a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
Gartner has again recognized Microsoft as a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms, positioned highest on the Ability to Execute. The post Microsoft is named a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint…
Microsoft is named a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
Gartner has again recognized Microsoft as a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms, positioned highest on the Ability to Execute. The post Microsoft is named a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint…
New research, tooling, and partnerships for more secure AI and machine learning
At Microsoft, we’ve been working on the challenges and opportunities of AI for years. Today we’re sharing some recent developments so that the community can be better informed and better equipped for a new world of AI exploration. The post…
SEC cyber risk management rule—a security and compliance opportunity
The proposed Securities and Exchange Commission rule creates new reporting obligations for United States publicly traded companies to disclose cybersecurity incidents, risk management, policies, and governance. This blog describes how the rule is an opportunity for the IT security team…
The Microsoft Intune Suite fuels cyber safety and IT efficiency
Today marks a significant shift in endpoint management and security. We are launching the Microsoft Intune Suite, which unifies mission-critical advanced endpoint management and security solutions into one simple bundle. The post The Microsoft Intune Suite fuels cyber safety and…
Microsoft Security Experts discuss evolving threats in roundtable chat
Get an in-depth recap of the latest Microsoft Security Experts Roundtable, featuring discussions on trends in global cybercrime, cyber-influence operations, cybersecurity for manufacturing and Internet of Things, and more. The post Microsoft Security Experts discuss evolving threats in roundtable chat…
5 reasons to adopt a Zero Trust security strategy for your business
Learn how Zero Trust security can help minimize damage from a breach, support hybrid work, protect sensitive data, and more. The post 5 reasons to adopt a Zero Trust security strategy for your business appeared first on Microsoft Security Blog.…
2022 in review: DDoS attack trends and insights
With DDoS attacks becoming more frequent, sophisticated, and inexpensive to launch, it’s important for organizations of all sizes to be proactive and stay protected. In this blog, we detail trends and insights into DDoS attacks we observed and mitigated throughout…
Microsoft Defender for Office 365 named Best Email Security Service of 2023 by SE Labs
Microsoft Defender for Office 365 receives Best Email Security Service of 2023 award by SE Labs. The post Microsoft Defender for Office 365 named Best Email Security Service of 2023 by SE Labs appeared first on Microsoft Security Blog. This…
Cybersecurity health and how to stay ahead of attackers with Linda Grasso
Linda Grasso of technology blog DeltalogiX discusses cybersecurity trends and the human and technology connection of cybersecurity. The post Cybersecurity health and how to stay ahead of attackers with Linda Grasso appeared first on Microsoft Security Blog. This article has…
Microsoft shifts to a comprehensive SaaS security solution
Learn how Microsoft Security is transforming its cloud access security broker to a software as a service security solution, empowering organizations to adopt a modern approach to protecting cloud apps. The post Microsoft shifts to a comprehensive SaaS security solution…
Addressing cybersecurity at the board level with Difenda and Microsoft
Learn how business leaders can utilize managed extended detection and response, powered by the Microsoft Security product portfolio, to make informed decisions and prioritize investments in cybersecurity at the board level. The post Addressing cybersecurity at the board level with…
Solving one of NOBELIUM’s most novel attacks: Cyberattack Series
This is the first in an ongoing series exploring some of the most notable cases of the Microsoft Detection and Response Team (DART), which investigates cyberattacks on behalf of our customers. The Cyberattack Series takes you behind the scenes for…
Learn what an AI-driven future means for cybersecurity at Microsoft Secure
Vasu Jakkal invites you to join us at the Microsoft Secure digital event to discover exciting product announcements and what an AI-driven future means for cybersecurity. The post Learn what an AI-driven future means for cybersecurity at Microsoft Secure appeared…
Solving one of NOBELIUM’s most novel attacks: Cyberattack Series
This is the first in an ongoing series exploring some of the most notable cases of the Microsoft Detection and Response Team (DART), which investigates cyberattacks on behalf of our customers. The Cyberattack Series takes you behind the scenes for…
Introducing Adaptive Protection in Microsoft Purview—People-centric data protection for a multiplatform world
Learn how machine learning in Microsoft Purview enables people-centric data protection and saves your security teams time. The post Introducing Adaptive Protection in Microsoft Purview—People-centric data protection for a multiplatform world appeared first on Microsoft Security Blog. This article has…
Mitigate risk by integrating threat modeling and DevOps processes
Are you wondering how you can effectively integrate threat modeling with your DevOps practice to maximize value and shift-left security? We have collected a few ideas for you, with the help of a few leading security experts. The post Mitigate…
Mitigate risk by integrating threat modeling and DevOps processes
Are you wondering how you can effectively integrate threat modeling with your DevOps practice to maximize value and shift-left security? We have collected a few ideas for you, with the help of a few leading security experts. The post Mitigate…
2023 identity security trends and solutions from Microsoft
Learn about the latest types of identity-based cyberattacks and how your organization can create an integrated, layered defense. The post 2023 identity security trends and solutions from Microsoft appeared first on Microsoft Security Blog. This article has been indexed from…
Introducing kernel sanitizers on Microsoft platforms
We share technical details of our work on the AddressSanitizer (ASAN) and how it contributes to durably improving software quality and security at Microsoft. The post Introducing kernel sanitizers on Microsoft platforms appeared first on Microsoft Security Blog. This article…
Microsoft Security reaches another milestone—Comprehensive, customer-centric solutions drive results
Learn how Microsoft Security is simplifying security for the new hybrid, multi-platform environment while fostering a diverse new generation of defenders—and how your organization can benefit. The post Microsoft Security reaches another milestone—Comprehensive, customer-centric solutions drive results appeared first on…
Microsoft Security innovations from 2022 to help you create a safer world today
Learn about the more than 300 Microsoft Security innovations launched in 2022, and how we’re making cybersecurity more inclusive and representative of our communities. The post Microsoft Security innovations from 2022 to help you create a safer world today appeared…
Digital event highlights new features in Microsoft Purview
Discover new data protection innovations, get best practices, and explore the latest research and insights at the Microsoft Purview digital event. The post Digital event highlights new features in Microsoft Purview appeared first on Microsoft Security Blog. This article has…
Secure your business like you secure your home: 5 steps to protect against cybercrime
Learn five simple actions small and medium-sized businesses can take to protect against evolving cyberattacks, as well as where to access tools and resources for securing your company. The post Secure your business like you secure your home: 5 steps…
Microsoft Entra: 5 identity priorities for 2023
Organizations are looking for opportunities to do more with less. By adopting the latest identity innovations, you can better protect both your digital estate and your budget. The post Microsoft Entra: 5 identity priorities for 2023 appeared first on Microsoft…
Unraveling the techniques of Mac ransomware
Understanding how Mac ransomware works is critical in protecting today’s hybrid environments. We analyzed several known Mac ransomware families and highlighted these families’ techniques, which defenders can study further to prevent attacks. The post Unraveling the techniques of Mac ransomware…