Skip to content

Microsoft Secure

EMS_business scenario planning 1

Assessing Microsoft 365 security solutions using the NIST Cybersecurity Framework

This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series, you’ll find context, answers, and guidance for deployment and driving adoption within your organization. Check out our last blog New FastTrack benefit: Deployment support for Co-management on Windows 10 devices....

Read more

The need and opportunity for adaptive prevention in the cloud

This post is authored by Michael Bargury, Data Scientist, C+E Security.  The need The cloud introduces new security challenges, which differ from classic ones by diversity and scale. Once a Virtual Machine (VM) is up and running with an open internet port, it is almost instantaneously subject to vulnerability scanning and Brute Force (BF) attacks....

Read more

EMS_business scenario planning 1

New FastTrack benefit: Deployment support for Co-management on Windows 10 devices

This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization. Check out our last blog Getting the most value out of your security deployment. We...

Read more

Updating your cybersecurity strategy to enable and accelerate digital transformation

This post is authored by Cyril Voisin, Chief Security Advisor, Enterprise Cybersecurity Group.  Nowadays every company is becoming a digital company to some extent. Digital transformation changes the way business is done. For example, it puts more control into the hands of employees, who now demand anytime, anywhere connectivity to the solutions and data they...

Read more

Cybersecurity Reference Architecture: Security for a Hybrid Enterprise

The Microsoft Cybersecurity Reference Architecture describes Microsoft’s cybersecurity capabilities and how they integrate with existing security architectures and capabilities. We recently updated this diagram and wanted to share a little bit about the changes and the document itself to help you better utilize it. How to use it We have seen this document used for...

Read more

From the ground up to the cloud: Microsoft’s Intelligent Security supporting CISOs’ cloud transformation

It’s no secret that Microsoft has embraced the cloud in a big way—from enterprise solutions like Microsoft Azure to Office 365 and Windows. But a recent research report by Forrester focuses on an equally important shift in our approach to security—integrating workforce and cloud security in ways that make them much easier for enterprise IT...

Read more

Data classification and protection now available for structured data in SQL

This post is authored by Gilad Mittelman, Senior Program Manager, SQL Data Security.  Data privacy and data security have become one of the most prominent topics in organizations in almost every industry across the globe. New regulations that formalize requirements are emerging around these topics and compel organizations to comply. The upcoming EU Global Data...

Read more