Select Page

Announcing Microsoft Defender ATP for Mac and new Threat and Vulnerability Management capabilities

On February 28, 2019, we announced Microsoft Threat Experts, a new managed hunting service within the Microsoft 365 Security portfolio that enables customers to extend their expertise and insights with the help of Microsoft security professionals. This release showcased our ... continue reading

5 steps financial institutions can take to reduce their cybercrime risk

When it comes to cybersecurity, financial institutions are uniquely challenged as they are often a target for hackers. My customers rightly worry about exposing their business and the broader financial system to a security breach. Some are reticent to adopt ... continue reading
The evolution of Microsoft Threat Protection, RSA edition part 2

The evolution of Microsoft Threat Protection, RSA edition part 2

In part 1, we provided a timeline of the Microsoft Threat Protection journey to date, an overview of Microsoft Azure Sentinel (our next-gen SIEM), and details of Microsoft Threat Experts, which combines the power of human and artificial intelligence to ... continue reading
The evolution of Microsoft Threat Protection, RSA edition part 1

The evolution of Microsoft Threat Protection, RSA edition part 1

Last week, the Microsoft Security team attended the RSA conference in San Francisco, California. We made several key announcements about Microsoft Threat Protection, the solution which provides end users optimal security from the moment they log in, use email, work ... continue reading
Step 6. Manage mobile apps: top 10 actions to secure your environment

Step 6. Manage mobile apps: top 10 actions to secure your environment

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 6. Manage mobile apps,” you’ll learn how to complete your Unified Endpoint Management (UEM) strategy ... continue reading
Infographic showing 59% correlate security alerts from disparate technologies to detect actual threats, 57% hire trained IT security staff, 57% modernize their organization's IT security strategies, and 60% retrain IT security staff.

Securing your digital transformation

Sometimes, technology can make things overly complex. Even with the best of intentions, there can be too much of a good thing. In the world of cybersecurity, complexity has been a mainstay, but in recent years, it has grown beyond ... continue reading

Helping security professionals do more, better

I’m on my way to the RSA Conference in San Francisco, California, and am looking forward to connecting with our customers and partners there. We have a lot to talk about. Last week, Ann Johnson announced two new services that ... continue reading