Beginning today, break free from your password and go passwordless with your Microsoft account.| Microsoft Security Blog
Azure Sentinel Fusion technology uses powerful machine learning methods to enable your SecOps team to focus on the threats that matter.| Microsoft Security Blog
Microsoft Threat Intelligence Center (MSTIC) has uncovered a wide-scale malicious email campaign operated by NOBELIUM, the threat actor behind the attacks against SolarWinds, the SUNBURST backdoor, TEARDROP malware, GoldMax malware, and other related components. The campaign, initially observed and tracked by Microsoft since January 2021, evolved over a series of waves demonstrating significant experimentation.| Microsoft Security Blog
As containers become a major part of many organizations’ IT workloads, it becomes crucial to consider the unique security threats that target such environments when building security solutions. The first step in this process is understanding the relevant attack landscape.| Microsoft Security Blog
With Microsoft Entra, you can protect yourself better with less effort.| TECHCOMMUNITY.MICROSOFT.COM
Alert fatigue is a top of mind challenge when it comes to security monitoring. As a result, organizations are constantly trying to improve their human capabilities, processes, and technology to address the challenge. Microsoft is uniquely positioned to take on this problem by tapping into the end-to-end capabilities of our Extended detection and response (XDR) offering that doesn’t just span the key security domains of concern but is also tightly integrated across those domains and powered ...| Microsoft Security Blog
20 years ago this week, Bill Gates sent a now-famous email to all Microsoft employees announcing the creation of the Trustworthy Computing (TwC) initiative. The initiative was intended to put customer security, and ultimately customer trust, at the forefront for all Microsoft employees.| Microsoft Security Blog