CISO Series: Lessons learned from the Microsoft SOC—Part 2a: Organizing people
In the second of our three-part series, we focus on the most valuable resource in the SOC—our people.
In the second of our three-part series, we focus on the most valuable resource in the SOC—our people.
Detect a security breach in real-time and respond immediately to reduce damage. Read our latest e-book, “Defend your digital landscape,” to find out how.
The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. We are defining discrete prescriptive Windows 10 security configurations (levels 5 through 1) to meet many of the common device scenarios we see today in the enterprise.
Learn about the four cyber hygiene best practices recommended in the 24th edition of the Microsoft Security Intelligence Report (SIR) to help reduce your risk of attack.
Learn how compound detection can help you apply the law of data gravity and correlate insights across your security platforms.
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 8.
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 7.
Increasingly financial institutions are concerned about their cybersecurity risk. Here are five recommendations can help them more effectively manage that risk.
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 6. Manage mobile apps,” you’ll learn how to complete your Unified Endpoint Management (UEM) strategy using Intune Mobile Application Management (MAM).
In the first of our three part series, we provide tips on how to manage a security operations center (SOC) to be more responsive, effective, and collaborative.