Cloud security controls series: Azure Security Center
The “holy grail” of security capabilities that I’ve heard so many CISOs talk about, enables them to manage the security of the systems in their organization using a policy-based approach that provides...
View ArticleSecuring Privileged Access
We’ve all probably heard the old axiom that a chain is only as strong as its weakest link. In the context of cybersecurity, in many IT environments the weakest link is the workstations that...
View ArticleJapan zeros in on cybersecurity
Japan is poised to take exciting steps towards improving cybersecurity in 2016. A confluence of events in 2015 catalyzed important actions from the Government of Japan action. A key wakeup call was the...
View ArticleCloud computing in government: security considerations
The last few months have seen a number of government information technology (IT) departments around the world move towards adopting cloud computing as one of the solutions deployed to delivered...
View ArticleWhat’s Next for EU Cybersecurity after the NIS Agreement?
After three years of intense negotiations, the EU finally reached agreement on the Network and Information Security (NIS) Directive this past December. Politically, all that remains to be done is for...
View ArticleThe Emerging Era of Cyber Defense and Cybercrime
Cyber threats are everywhere, from hackers causing mischief to show off their skills to organized crime syndicates employing sophisticated financial ruses against governmental organizations,...
View ArticleThe continued importance of cybersecurity capacity building
Over the past decade, billions around the world have benefited from the exponential growth of the online environment and associated economic opportunities. The Internet has transformed from an...
View ArticleCybersecurity norms: From concept to implementation
Last year Microsoft put forward six cybersecurity norms with the aim of reducing conflict in cyberspace and protecting global trust in technology. They offer considerations for limiting nation-state...
View ArticleWorking to increase the cyber resilience of cities around the globe
A year ago, Microsoft and the Rockefeller Foundation announced that we will be partnering on their 100 Resilient Cities challenge, in an effort to help cities address emerging cyber resilience needs....
View ArticleHeaded to RSA? Here’s your event guide for trust in cloud services
RSA Conference 2016 is fast approaching. The conference agenda is packed to cover the rapidly evolving issues in information security, with trust in cloud computing at the forefront. We’ll be there to...
View ArticleProgress Report: Enterprise security for our mobile-first, cloud-first world
Today Microsoft made numerous announcements about new security capabilities, products and features. These are all designed to help our customers accelerate the adoption of a more holistic security...
View ArticleAnatomy of a Breach: How Hackers break in
Did you know that an attacker can be present on a network for more than 200 days before being detected? Imagine the damage that can be done to an organization during that time: Accessing sensitive data...
View Article
More Pages to Explore .....