Skip to content
Microsoft Secure

Keeping browsing experience in users’ hands

Protecting the modern workplace from a wide range of undesirable software Our evaluation criteria describe the characteristics and behavior of malware and potentially unwanted applications and guide the proper identification of threats. Learn how we classify malicious software, unwanted software, and potentially unwanted applications. Read the blog post. ​In April last year we announced some...

Read more

Microsoft updates Trusted Root Certificate Program to reinforce trust in the Internet

At Microsoft, we are continuously working to deliver on our commitment to the security of our customers and their ecosystems. A core component of our strategy to inform Windows users about the safety of the websites, apps and software they’re accessing online is built into the Microsoft Trusted Root Certificate Program. This program takes root...

Read more

Securing Privileged Access

We’ve all probably heard the old axiom that a chain is only as strong as its weakest link. In the context of cybersecurity, in many IT environments the weakest link is the workstations that administrators with privileged accounts use to connect to critical infrastructure and applications. If these management workstations aren’t properly secured, high privilege...

Read more

Cloud security controls series: Azure Security Center

The “holy grail” of security capabilities that I’ve heard so many CISOs talk about, enables them to manage the security of the systems in their organization using a policy-based approach that provides them with a single place to monitor which systems meet their security policies, which systems do not meet policies and also helps them...

Read more

Tracking Lateral Movement blog series by Jessica Payne

I’d like to highlight a great new series of articles that a colleague of mine in Microsoft’s new Enterprise Cybersecurity Group, Jessica Payne, has recently started publishing. Lateral movement is a topic that literally every security professional I talk to is interested in, these days. Here’s the first article Jessica has published in the series:...

Read more

The Threat Landscape in Canada – 2015 Update

I have written about the threat landscape in Canada a couple of times over the years. Using new data from the latest volume of the Microsoft Security Intelligence Report, volume 19, I thought I’d take a fresh look at what has been happening in Canada as its been about a year since I last published...

Read more

Shields up on potentially unwanted applications in your enterprise

Has your enterprise environment been bogged down by a sneaky browser-modifier which tricked you into installing adware from a seemingly harmless software bundle? Then you might have already experienced what a potentially unwanted application (PUA) can do. The good news is, the new opt-in feature for enterprise users in Windows can spot and stop PUA...

Read more

A Single, Unified Trust Center for the Microsoft Cloud

Today we’re pleased to announce that we have created a single Microsoft Trust Center at www.microsoft.com/trustcenter, which unifies the trust centers of our enterprise cloud services—Microsoft Azure, Microsoft Dynamics CRM Online, Microsoft Intune, and Microsoft Office 365. Increasingly, our customers deploy multiple Microsoft cloud services, and many expressed a desire for a single point of...

Read more

Microsoft Security Intelligence Report Volume 19 is now available

We’ve just published hundreds of pages of new threat intelligence available for free download at www.microsoft.com/sir. This includes threat data from the first half of 2015 as well as longer term trend data on the industry vulnerabilities, exploits, malware, and malicious websites that your organization should use to assess your current security posture. We are...

Read more

New Microsoft Enterprise Cybersecurity Group to Provide Greater Security Capabilities

We’ve worked hard to earn our customers’ trust when it comes to making their data more secure and we recently announced some significant advances in this area. As part of that news, my team’s newly formed Enterprise Cybersecurity Group, provides a significant new cybersecurity asset to Microsoft commercial and public sector customers. Microsoft’s Enterprise Cybersecurity...

Read more