Select Page
Five tips to improve the migration process to Azure Active Directory

Five tips to improve the migration process to Azure Active Directory

Hello! This is Sue Bohn, director of program management for Identity and Access Management. I’m thrilled to announce the first post in our Voice of the Partner blog series. Today we’ve invited Joe Stocker of Patriot Consulting to share five ... continue reading
Attack chain diagram

Analysis of a targeted attack exploiting the WinRar CVE-2018-20250 vulnerability

In early March, we discovered a cyberattack that used an exploit for CVE-2018-20250, an old WinRar vulnerability disclosed just several weeks prior, and targeted organizations in the satellite and communications industry. A complex attack chain incorporating multiple code execution techniques ... continue reading
Step 8. Protect your documents and email: top 10 actions to secure your environment

Step 8. Protect your documents and email: top 10 actions to secure your environment

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 8. Protect your documents and email,” you’ll learn how to deploy Azure Information Protection and ... continue reading
tax-related phishing document with malicious macro code

Steer clear of tax scams

In the month of February, we saw an average of 300,000 phishing attempts across Microsoft’s browsing platforms daily. Our security experts expect these attempted scams to become increasingly more prevalent through the April 15 Tax Day, especially in the two ... continue reading
Infographic showing a Shadow IT discovery lifecycle. Phase one: discover and identify. Phase two: evaluate and analyze. Phase three: manage and continuous monitoring.

Step 7. Discover shadow IT and take control of your cloud apps: Top 10 actions to secure your environment

This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 7. Discover shadow IT and take control of cloud apps,” you’ll learn how to set up Microsoft Cloud App Security ... continue reading

DART: the Microsoft cybersecurity team we hope you never meet

If you spent 270 days away from home, not on vacation, you’d want it to be for a good reason. When boarding a plane, sometimes having been pulled out of bed to leave family for weeks on end, I know ... continue reading
image

Microsoft’s Azure Cosmos DB is named a leader in the Forrester Wave: Big Data NoSQL

We’re excited to announce that Forrester has named Microsoft as a Leader in The Forrester Wave™: Big Data NoSQL, Q1 2019 based on their evaluation of Azure Cosmos DB. We believe Forrester’s findings validate the exceptional market momentum of Azure ... continue reading
The evolution of Microsoft Threat Protection, RSA edition part 2

The evolution of Microsoft Threat Protection, RSA edition part 2

In part 1, we provided a timeline of the Microsoft Threat Protection journey to date, an overview of Microsoft Azure Sentinel (our next-gen SIEM), and details of Microsoft Threat Experts, which combines the power of human and artificial intelligence to ... continue reading
The evolution of Microsoft Threat Protection, RSA edition part 1

The evolution of Microsoft Threat Protection, RSA edition part 1

Last week, the Microsoft Security team attended the RSA conference in San Francisco, California. We made several key announcements about Microsoft Threat Protection, the solution which provides end users optimal security from the moment they log in, use email, work ... continue reading
Step 6. Manage mobile apps: top 10 actions to secure your environment

Step 6. Manage mobile apps: top 10 actions to secure your environment

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 6. Manage mobile apps,” you’ll learn how to complete your Unified Endpoint Management (UEM) strategy ... continue reading