Select Page
Decorative image illustrating Microsoft 365 Defender's staples for protecting against ransomware.

Microsoft protects against human-operated ransomware across the full attack chain in the 2022 MITRE Engenuity ATT&CK® Evaluations

For the fourth year in a row, the independent MITRE Engenuity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) Evaluations demonstrated Microsoft’s strong detection and protection capabilities thanks to our multi-platform extended detection and response (XDR) defenses. The ever-evolving threat landscape ... continue reading
Microsoft Defender for Cloud Dashboard featuring security posture chart, Firewall manage, regulatory compliance status, and workload protections.

3 steps to secure your multicloud and hybrid infrastructure with Azure Arc

As businesses around the world grapple with the growth of an industrialized, organized attacker ecosystem, the need for customers to secure multicloud and hybrid infrastructure and workloads is increasingly urgent. Today, organizations face an attacker ecosystem that is highly economically ... continue reading
AlanLaPietra_0-1648554341870.png

Microsoft Defender Ecosystem

DEFENDER FOR CLOUD Microsoft Defender for Cloud - an introduction | Microsoft Docs Defender for Cloud is a tool for security posture management and threat protection. It strengthens the security posture of your cloud resources, and with its integrated Microsoft ... continue reading
Azure Front Door is a modern cloud CDN.

Introducing the new Azure Front Door: Reimagined for modern apps and content

This blog has been co-authored by Jessie Jia, Senior Program Manager, Azure Networking and Gunjan Jain, Principal Program Manager, Azure Networking. In 2019, we launched Azure Front Door to bring enterprise-grade content delivery network (CDN) capabilities to our customers. This ... continue reading
Example of a detected SQL injection attack alert in Microsoft Defender for Cloud

Stay on top of database threats with Microsoft Defender for Azure Cosmos DB

Databases are constantly evolving to handle new use cases, incorporate more intelligence, and store more data, giving developers and organizations a wide range of database types to meet their varying needs. Because aspects including architecture, capabilities, configuration options, and authentication ... continue reading
Microsoft Defender for Cloud dashboard with connected Azure subscriptions, A W S accounts, and G C P projects.

Microsoft Security delivers new multicloud capabilities

In times of great change, challenges and opportunities can be found in many directions. This is certainly true in IT and cybersecurity. Today, while navigating a pandemic, frequent supply chain shocks, and global talent shortages, organizations around the world are ... continue reading
Open Systems’ MDR integration with Microsoft.

How Open Systems uses Microsoft tools to improve security maturity

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. We’ve all seen it happen—an organization has all the top-notch security tools in place and still, they get breached. In today’s rapidly evolving threat landscape, ... continue reading
Microsoft Security's Zero Trust architecture flow chart depicting lessons learned from thousands of Zero Trust deployments.

Evolving Zero Trust—Lessons learned and emerging trends

Looking back at the last two years, to say that our security strategies have evolved would be an understatement. Organizations around the world made overnight transitions to remote work models in response to a global pandemic, forcing them to reassess ... continue reading
Within seconds attackers can find exploitable IoT targets that can become a point of entry into a business network. Once inside they can find sensitive information within minutes. In a hours time valuable data can be exfiltrated and for sale on the Darkweb.

How Microsoft Defender for IoT can secure your IoT devices

Cybersecurity threats are always evolving, and today we’re seeing a new wave of advanced attacks specifically targeting IoT devices used in enterprise environments as well as operational technology (OT) devices used in industrial systems and critical infrastructure (like ICS/SCADA). It’s ... continue reading
Web Category Search screenshot

Upgrade your network protection with Azure Firewall Premium

This blog has been co-authored by Suren Jamiyanaa, Program Manager II and Eliran Azulai, Principal Program Manager. We continue to be amazed by the adoption, interest, positive feedback, and the breadth of use cases customers are finding for our service ... continue reading