
Cybersecurity Reference Architecture: Security for a Hybrid Enterprise
The Microsoft Cybersecurity Reference Architecture describes Microsofts cybersecurity capabilities and how they integrate with existing security architectures and capabilities. We recently updated this diagram and wanted to share a little bit about the changes and the document itself to help ... continue reading
Use Windows Information Protection (WIP) to help make accidental data leakage a thing of the past
Have you always wished you could have mobile application management (MAM) on Windows? Now you can! Windows Information Protection (WIP) is an out-of-the box data leakage prevention feature for Windows 10 that can automatically apply protection for work files and ... continue reading
Tapping the intelligent cloud to make security better and easier
There has been a distinct shift in my conversations with customers over the last year. Most have gone from asking can we still keep our assets secure as we adopt cloud services?, to declaring, we are adopting cloud services in ... continue reading
Complying with General Data Protection Regulation (GDPR) on Microsoft Data Platform technologies
This post is authored by Frederico Pravatta Rezende, Senior Product Marketing Manager, CADD & AI. Is your organization prepared for the General Data Protection Regulation (GDPR)? If your company does business in Europe, you’ll need to be aware of this ... continue reading

What’s new in SSMS 17.5: Data Discovery and Classification
This post is authored by Alan Yu, Program Manager, SQL Server. We are excited to announce the release of SQL Server Management Studio (SSMS) 17.5! Download SSMS 17.5 and review the Release Notes to get started. SSMS 17.5 provides support ... continue reading

How Microsoft tools and partners support GDPR compliance
This post is authored by Daniel Grabski,Executive Security Advisor, Microsoft Enterprise Cybersecurity Group. As an Executive Security Advisor for enterprises in Europe and the Middle East, I regularly engage with Chief Information Security Officers (CISOs), Chief Information Officers (CIOs) and ... continue reading