Changing the Monolith—Part 3: What’s your process?

Credit to Author: Todd VanderArk| Date: Thu, 30 Jan 2020 17:00:28 +0000

Digital transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people, process, and technology that make up the organization.

The post Changing the Monolith—Part 3: What’s your process? appeared first on Microsoft Security.

Read more

How to avoid getting caught in a “Groundhog Day” loop of security issues

Credit to Author: Todd VanderArk| Date: Tue, 08 Oct 2019 16:00:58 +0000

One of the best ways to thwart cybercrime is to involve security experts before deploying new products and services.

The post How to avoid getting caught in a “Groundhog Day” loop of security issues appeared first on Microsoft Security.

Read more

3 strategies for building an information protection program

Credit to Author: Todd VanderArk| Date: Tue, 25 Jun 2019 16:20:29 +0000

Five years ago, we started on a journey to update and simplify information protection at Microsoft. We’ve learned a lot about data protection and tools and today we’re sharing some of our best practices.

The post 3 strategies for building an information protection program appeared first on Microsoft Security.

Read more