Security

MicrosoftSecurity

Join us at InfoSec Jupyterthon 2024

Credit to Author: Microsoft Threat Intelligence| Date: Mon, 29 Jan 2024 18:00:00 +0000

Jupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations center (SOC) tools. Notebooks can be used interactively for threat detection and response, or as automated tasks in a larger pipeline. Their flexibility and ability to combine code, data analysis, and visualization in a single, […]

The post Join us at InfoSec Jupyterthon 2024 appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Best practices in moving to cloud native endpoint management

Credit to Author: Jason Roszak| Date: Mon, 29 Jan 2024 17:00:00 +0000

This blog is the second of three that details our recommendation to adopt cloud native device management. Understand the lessons from various Intune customers in their journeys and how they achieved greater security, cost savings, and readiness for the future through their cloud transformations.

The post Best practices in moving to cloud native endpoint management appeared first on Microsoft Security Blog.

Read More