What is Top of Mind for CISOs Right Now
BrandPost Microsoft Security

What is Top of Mind for CISOs Right Now

Learn what steps CISOs are taking to protect against today’s top threats and how you can apply their guidance to your own operations.

#BeCyberSmart All Year Round With Educational Resources from Microsoft
BrandPost Microsoft Security

#BeCyberSmart All Year Round With Educational Resources from Microsoft

October may have been Cybersecurity Awareness Month, but Microsoft is on a mission to equip everyone with the tools and best practices needed to strengthen cyber defenses all year.

The Cyberthreat Minute: The Scale and Scope of Worldwide Cybercrime in 60 Seconds
BrandPost Microsoft Security

The Cyberthreat Minute: The Scale and Scope of Worldwide Cybercrime in 60 Seconds

Explore key findings from the Cyberthreat Minute, a comprehensive report on malicious activity happening within any given 60-second window across the globe.

BrandPost Microsoft Security

Extortion Economics: Ransomware’s New Business Model

With the right approach, cybercrime can be turned into a preventable disruption to business. There are our top tips to strengthening your posture against the ransomware economy.

Is MFA the Vegetable of Cybersecurity?
BrandPost Microsoft Security

Is MFA the Vegetable of Cybersecurity?

Like it or not, vegetables are good for us. Chowing down on some broccoli or kale can help us build strong bones, reduce our risk of chronic diseases, and deliver the vitamins our bodies need. And yet, the CDC reports that only...

Security Leaders Share 5 Steps to Strengthening Cyber Resilience
BrandPost Microsoft Security

Security Leaders Share 5 Steps to Strengthening Cyber Resilience

With new threat actors emerging every day and a growing number of cyber attacks making headlines, cybersecurity has become a critical business imperative. Security leaders face the dual challenge of needing to stay competitive in...

CISOs Are Focused on These 3 Trends, Are You?
BrandPost Microsoft Security

CISOs Are Focused on These 3 Trends, Are You?

Security leaders are facing growing pressures in today’s rapidly evolving cyber landscape. The rise in remote work means that many organizations are managing a complex web of in-person, online, and hybrid work scenarios while also...

5 Attack Elements Organizations Should Monitor: Anatomy of an External Attack Surface
BrandPost Microsoft Security

5 Attack Elements Organizations Should Monitor: Anatomy of an External Attack Surface

How to shift your organization’s perception of comprehensive security in the face of ongoing global cyber threats.

What Every Enterprise Can Learn from Russia’s Cyber Assault on Ukraine
BrandPost Microsoft Security

What Every Enterprise Can Learn from Russia’s Cyber Assault on Ukraine

Based on its observations of Russia’s cyber assault on Ukraine, Microsoft has developed these strategic steps for global organizations to take to safeguard their operations.

6 Ways to Protect Your Organization Against the Threat Group DEV-0537
BrandPost Microsoft Security

6 Ways to Protect Your Organization Against the Threat Group DEV-0537

The hacking group DEV-0537, also known as LAPSUS$, operates on a global scale using a pure extortion and destruction model without deploying ransomware payloads. They recently made headlines after they breached multiple...

Hardening Identities with Phish-Resistant MFA
BrandPost Microsoft Security

Hardening Identities with Phish-Resistant MFA

As cybercriminals adapt their tactics for credential theft, security teams can harden identities utilizing many built-in security options already at their disposal.

Top 4 Common Mistakes That Could Hurt Your Security Program
BrandPost Microsoft Security

Top 4 Common Mistakes That Could Hurt Your Security Program

By Chris Kirk - Principal Cybersecurity Consultant, Anthony Petito - Principal Technical Delivery Consultant, and Roberto Bamberger - Principal Cybersecurity Consultant As the Microsoft Detection and Response Team (DART), our job...

How CISOs Can Manage the Intersection of Security, Privacy & Trust
BrandPost Microsoft Security

How CISOs Can Manage the Intersection of Security, Privacy & Trust

By Alym Rayani There’s an old adage among cyber security professionals: “You can’t protect what you can’t see.” And with data exploding literally everywhere, it has become increasingly hard to protect. In fact, the World Economic...

Mitigating Challenges Associated with CMMC Compliance
BrandPost Microsoft Security

Mitigating Challenges Associated with CMMC Compliance

By Lisa Haywood - Government Cloud & CMMC Global Black Belt, Justin Orcutt - Security Specialist - Aerospace & Defense, Richard Wakeman - Chief Architect - Aerospace & Defense, Paul Meacham - Chief Technical Officer,...

How to Increase Your Confidence in Cloud Security with Microsoft
BrandPost Microsoft Security

How to Increase Your Confidence in Cloud Security with Microsoft

By Yuri Diogenes, Principal PM Manager, Microsoft Defender for Cloud The cloud is an engine that powers our daily lives. While the cloud has promised benefits such as improved IT efficiency, flexibility and scalability, there is...

Weathering Corporate Change With Insider Risk Management
BrandPost Microsoft Security

Weathering Corporate Change With Insider Risk Management

By Talhah Mir, Principal Product Manager, Microsoft We are operating in the most sophisticated threat landscape ever seen, and coupled with the latest great disruption—hybrid work—security is more challenging than ever. Protecting...

Presenting the Business Case for Security to Your Board of Directors
BrandPost Microsoft Security

Presenting the Business Case for Security to Your Board of Directors

By Jim Eckhart, Executive Security Advisor, Microsoft In a landscape of evolving threats, cybersecurity is a critical discussion that must happen on a regular basis at the board level. A favorite question that nearly all board...

Lessons Learned from the Microsoft SOC
BrandPost Microsoft Security

Lessons Learned from the Microsoft SOC

By John Dellinger, Executive Security Advisor, Microsoft With trillions of cyber threats in daily circulation, Security Operations Centers (SOCs) must be fast and accurate for detection and response. Everything in the SOC should...

The Fearless CISO: 4 Ways to Secure Everything
BrandPost Microsoft Security

The Fearless CISO: 4 Ways to Secure Everything

Align security with business priorities with a comprehensive, four-step approach.

The Playbook for Human-Operated Ransomware
BrandPost Microsoft Security

The Playbook for Human-Operated Ransomware

As attackers increasingly use a three-step approach to get access to organizational data, enterprises need a better security plan.

Load More
Top Blog Posts