Category: Microsoft Security Blog

2022 in review: DDoS attack trends and insights

With DDoS attacks becoming more frequent, sophisticated, and inexpensive to launch, it’s important for organizations of all sizes to be proactive and stay protected. In this blog, we detail trends and insights into DDoS attacks we observed and mitigated throughout…

Microsoft shifts to a comprehensive SaaS security solution

Learn how Microsoft Security is transforming its cloud access security broker to a software as a service security solution, empowering organizations to adopt a modern approach to protecting cloud apps. The post Microsoft shifts to a comprehensive SaaS security solution…

2023 identity security trends and solutions from Microsoft

Learn about the latest types of identity-based cyberattacks and how your organization can create an integrated, layered defense. The post 2023 identity security trends and solutions from Microsoft appeared first on Microsoft Security Blog. This article has been indexed from…

Introducing kernel sanitizers on Microsoft platforms

We share technical details of our work on the AddressSanitizer (ASAN) and how it contributes to durably improving software quality and security at Microsoft. The post Introducing kernel sanitizers on Microsoft platforms appeared first on Microsoft Security Blog. This article…

Digital event highlights new features in Microsoft Purview

Discover new data protection innovations, get best practices, and explore the latest research and insights at the Microsoft Purview digital event. The post Digital event highlights new features in Microsoft Purview appeared first on Microsoft Security Blog. This article has…

​​Microsoft Entra: 5 identity priorities for 2023

​Organizations are looking for opportunities to do more with less. By adopting the latest identity innovations, you can better protect both your digital estate and your budget. The post ​​Microsoft Entra: 5 identity priorities for 2023 appeared first on Microsoft…

Unraveling the techniques of Mac ransomware

Understanding how Mac ransomware works is critical in protecting today’s hybrid environments. We analyzed several known Mac ransomware families and highlighted these families’ techniques, which defenders can study further to prevent attacks. The post Unraveling the techniques of Mac ransomware…