Microsoft

MicrosoftSecurity

​​Forrester names Microsoft a Leader in the 2025 Zero Trust Platforms Wave™ report

Credit to Author: Joy Chik and Vasu Jakkal| Date: Thu, 10 Jul 2025 16:00:00 +0000

Employing a Zero Trust strategy is an effective way to modernize security infrastructure to protect against ever evolving security challenges.

The post ​​Forrester names Microsoft a Leader in the 2025 Zero Trust Platforms Wave™ report appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Microsoft expands Zero Trust workshop to cover network, SecOps, and more

Credit to Author: Rob Lefferts| Date: Wed, 09 Jul 2025 16:00:00 +0000

The Microsoft Zero Trust workshop has been expanded to cover all six pillars of Zero Trust security, providing a comprehensive guide for organizations to modernize their security posture.

The post Microsoft expands Zero Trust workshop to cover network, SecOps, and more appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Enhancing Microsoft 365 security by eliminating high-privilege access 

Credit to Author: Naresh Kannan| Date: Tue, 08 Jul 2025 19:00:00 +0000

​In this blog you will hear directly from Microsoft’s Deputy Chief Information Security Officer (CISO) for Experiences and Devices, Naresh Kannan, about eliminating high-privileged access across all Microsoft 365 applications. This blog is part of an ongoing series where our Deputy CISOs share their thoughts on what is most important in their respective domains. In this series you will get practical advice and forward-looking commentary on where the industry is going, as well as tactics you should start (and stop) deploying, and more.

The post Enhancing Microsoft 365 security by eliminating high-privilege access  appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

​​Explore practical best practices to secure your data with Microsoft Purview​​

Credit to Author: Raman Kalyan| Date: Fri, 25 Apr 2025 16:00:00 +0000

Microsoft presents best practices for securing data and optimizing Microsoft Purview implementation, emphasizing the integration of people, processes, and technology.

The post ​​Explore practical best practices to secure your data with Microsoft Purview​​ appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Build a stronger security strategy with proactive and reactive incident response: Cyberattack Series

Credit to Author: Microsoft Incident Response| Date: Mon, 10 Feb 2025 17:00:00 +0000

Find out how a cyberattack by Storm-2077 was halted faster because the Microsoft Incident Response team is both proactive and reactive at the same time.

The post Build a stronger security strategy with proactive and reactive incident response: Cyberattack Series appeared first on Microsoft Security Blog.

Read More