Microsoft Security

Nation-State Threats and the Rise of Cyber Mercenaries: Exploring the Microsoft Digital Defense Report

Understanding Device and Infrastructure Attacks: Exploring the Microsoft Digital Defense Report 2022

Understanding Device and Infrastructure Attacks: Exploring the Microsoft Digital Defense Report 2022

This article explores section two of the 2022 Microsoft Digital Defense Report, focusing on device and infrastructure attacks. The report offers insight and guidance on how organizations can help strengthen their cyber defenses.

The State of Cybercrime In 2022: Exploring the Microsoft Digital Defense Report

The State of Cybercrime In 2022: Exploring the Microsoft Digital Defense Report

Explore the state of cybercrime – and what it means for your organization – with these in-depth findings from the Microsoft Digital Defense Report.

Today’s workforce wants flexibility. Companies need Zero Trust.

Today’s workforce wants flexibility. Companies need Zero Trust.

Companies seeking new ways to accelerate their digital transformation, enable remote BYOD work, and shift infrastructure and processes to the cloud, need comprehensive Zero Trust security.

What is Top of Mind for CISOs Right Now

What is Top of Mind for CISOs Right Now

Learn what steps CISOs are taking to protect against today’s top threats and how you can apply their guidance to your own operations.

#BeCyberSmart All Year Round With Educational Resources from Microsoft

#BeCyberSmart All Year Round With Educational Resources from Microsoft

October may have been Cybersecurity Awareness Month, but Microsoft is on a mission to equip everyone with the tools and best practices needed to strengthen cyber defenses all year.

Extortion Economics: Ransomware’s New Business Model

Extortion Economics: Ransomware’s New Business Model

With the right approach, cybercrime can be turned into a preventable disruption to business. There are our top tips to strengthening your posture against the ransomware economy.

Security Leaders Share 5 Steps to Strengthening Cyber Resilience

Security Leaders Share 5 Steps to Strengthening Cyber Resilience

With new threat actors emerging every day and a growing number of cyber attacks making headlines, cybersecurity has become a critical business imperative. Security leaders face the dual challenge of needing to stay competitive in...

CISOs Are Focused on These 3 Trends, Are You?

CISOs Are Focused on These 3 Trends, Are You?

Security leaders are facing growing pressures in today’s rapidly evolving cyber landscape. The rise in remote work means that many organizations are managing a complex web of in-person, online, and hybrid work scenarios while also...

5 Attack Elements Organizations Should Monitor: Anatomy of an External Attack Surface

5 Attack Elements Organizations Should Monitor: Anatomy of an External Attack Surface

How to shift your organization’s perception of comprehensive security in the face of ongoing global cyber threats.

What Every Enterprise Can Learn from Russia’s Cyber Assault on Ukraine

What Every Enterprise Can Learn from Russia’s Cyber Assault on Ukraine

Based on its observations of Russia’s cyber assault on Ukraine, Microsoft has developed these strategic steps for global organizations to take to safeguard their operations.

6 Ways to Protect Your Organization Against the Threat Group DEV-0537

6 Ways to Protect Your Organization Against the Threat Group DEV-0537

The hacking group DEV-0537, also known as LAPSUS$, operates on a global scale using a pure extortion and destruction model without deploying ransomware payloads. They recently made headlines after they breached multiple...

Load More