Zero Trust framework to enable remote work
The Zero Trust Assessment tool is now live!
The post Zero Trust framework to enable remote work appeared first on Microsoft Security. READ MORE HERE…
The Zero Trust Assessment tool is now live!
The post Zero Trust framework to enable remote work appeared first on Microsoft Security. READ MORE HERE…
If you don’t have enough diversity on your cybersecurity team, it may be because you aren’t looking in the right places.
The post Welcoming a more diverse workforce into cybersecurity: expanding the pipeline appeared first on Microsoft Security. READ MORE HERE…
Do you have the right practices in place to retain and grow the cybersecurity women who already work at your company?
The post Welcoming and retaining diversity in cybersecurity appeared first on Microsoft Security. READ MORE HERE…
I’ve long been a proponent to challenging traditional schools of thought—traditional cyber-norms—and encouraging our industry to get outside its comfort zones.
The post Welcoming more women into cybersecurity: the power of mentorships appeared first on Microsoft Security. READ MORE HERE…
With many employees suddenly working from home, there are things an organization and employees can do to help remain productive without increasing cybersecurity risk.
The post Work remotely, stay secure—guidance for CISOs appeared first on Microsoft Security. READ MORE HERE…
A threat hunting team can help you defend against stealth attackers.
The post Threat hunting: Part 1—Why your SOC needs a proactive hunting team appeared first on Microsoft Security. READ MORE HERE…
Azure Sphere is now generally available: Ann Johnson and Galen Hunt discuss cybersecurity, IoT, and why device security matters.
The post Azure Sphere—Microsoft’s answer to escalating IoT threats—reaches general availability appeared first on Microsoft Security. READ MORE HERE…
Listen to Ann Johnson discuss the scale of cyber threats—past, present, and future—with security strategist, Marc Goodman on her new podcast, Afternoon Cyber Tea.
The post Afternoon Cyber Tea—The State of Cybersecurity: How did we get here? What does it mean? appeared first on Microsoft Security. READ MORE HERE…
The goal of MFA implementation is to enable it for all your users, on all of your systems, all of the time. Learn how to successfully roll out and support MFA in your organization.
The post How to implement Multi-Factor Authentication (MFA) appeared first on Microsoft Security. READ MORE HERE…
In this next post in our series, we provide insight into a day in the life of our SOC analysts investigating common front door attacks.
The post CISO series: Lessons learned from the Microsoft SOC—Part 3b: A day in the life appeared first on Microsoft Security. READ MORE HERE…