Skip to main content
Skip to main content
Microsoft
Security
Security
  • Home
    • Cloud security
    • Compliance management
    • Identity & access management
      • Decentralized identity blockchain
      • Identity & access management overview
      • Identity compromise protection
      • Identity governance
      • Seamless user experiences
      • Secure app access
      • Unified identity management
    • Information protection & governance
    • Risk management
    • Secure remote work
    • Threat protection
    • Zero Trust
    • App & email security
      • Azure Dedicated HSM
      • Azure Key Vault
      • Microsoft Cloud App Security
      • Microsoft Defender for Office 365
    • Compliance
      • Compliance management
      • Information protection & governance
      • Risk management
    • Endpoint security
      • Azure Defender for IoT
      • Azure IoT Central
      • Azure Sphere
      • Microsoft Defender for Endpoint
      • Microsoft Defender for Identity
      • Microsoft Endpoint Manager
    • Identity & access management
      • Azure Active Directory
      • Conditional Access
      • External identities
      • Identity protection
      • Multifactor authentication (MFA)
      • Passwordless Authentication
      • Privileged Identity Management (PIM)
      • SSO solution: Secure app access with single sign-on
    • Network security
      • Azure Application Gateway
      • Azure DDoS Protection
      • Azure Firewall
      • Azure Firewall manager
      • Azure Front-door
      • Azure VPN Gateway
      • Azure Web Application Firewall
    • Security posture
      • Azure Security Center
      • Microsoft Secure Score
    • SIEM & XDR
      • Azure Defender
      • Azure Defender for IoT
      • Azure Sentinel
      • Microsoft 365 Defender
      • Microsoft Defender for Endpoint
    • Find a partner
    • Government partners
    • Industry alliances
    • Microsoft Intelligent Security Association
    • Partners overview
    • Events
    • Intelligence reports
    • Security blog
    • Security operations
    • Security technical content
    • Service Trust Portal
    • Trust Center
    • Webinars, whitepapers & more
      • Microsoft 365
      • Azure
      • Office 365
      • Dynamics 365
      • Power Platform
      • Windows 10
    • Products & Services
      • Windows Server
      • Enterprise Mobility + Security
      • Power BI
      • Teams
      • Visual Studio
      • Microsoft Advertising
    • Emerging Technologies
      • AI
      • Internet of Things
      • Azure Cognitive Services
      • Quantum
      • Microsoft HoloLens
      • Mixed Reality
    • Developer & IT
      • Docs
      • Developer Center
      • Windows Dev Center
      • Windows IT Pro Center
      • FastTrack
      • Power Platform
    • Partner
      • Partner Network
      • Solution Providers
      • Partner Center
      • Cloud Hosting
    • Industries
      • Education
      • Financial services
      • Government
      • Health
      • Manufacturing & resources
      • Retail
    • Other
      • Security
      • Licensing
      • AppSource
      • Azure Marketplace
      • Events
      • Research
    • View Sitemap
    Sign in
    Adult female sitting on couch inside working on Surface Laptop. Windows 11 enables security by design from the chip to the cloud
    June 25, 2021

    Windows 11 enables security by design from the chip to the cloud

    Over the last year, PCs have kept us connected to family, friends, and enabled businesses to continue to run. This new hybrid work paradigm has got us thinking about how we will continue to deliver the best possible quality, experience, and security for the more than 1 billion people who use Windows.

    Read more Windows 11 enables security by design from the chip to the cloud
    Recent articles
      • See all
      • Azure Active Directory
      • Azure Defender
      • Azure Information Protection
      • Azure Sentinel
      • Microsoft 365 Defender
      • Microsoft 365 Security
      • Microsoft Authenticator
      • Microsoft Cloud App Security
      • Microsoft Defender for Endpoint
      • Microsoft Defender for Office 365
      • Microsoft Endpoint Manager
      • Microsoft Graph Security API
      • Office 365 Security
      • Secure Score
      • Windows Security
      • XDR
      • See all
      • AI and machine learning
      • Automation
      • Cloud Access Security Broker
      • Compliance
      • Cybersecurity policy
      • Data governance
      • Email security
      • Encryption
      • Endpoint security
      • GDPR
      • Identity and access management
      • Incident response
      • Information/data protection
      • IoT
      • Mobile security
      • Network security
      • Phishing
      • Ransomware
      • Security deployment
      • Security intelligence
      • Security management
      • Security operations
      • Security strategies
      • SIEM
      • Threat protection
      • XDR
      • Zero trust
      • See all
      • CISO series
      • Compliance
      • Identity and access management
      • Integrated Threat Protection
      • IoT security
      • Microsoft Detection and Response Team (DART)
      • Microsoft Intelligent Security Association (MISA)
      • Microsoft security intelligence
      • Secure remote work
      • Security deployment
      • Voice of the community
      • Voice of the customer
      • Azure Active Directory Identity
      • Enterprise Mobility + Security
      • Microsoft 365
      • Microsoft Endpoint Management
      • Microsoft Security Guidance
      • Microsoft Security Response Center
      • Security in Azure
      • Security Research & Defense
    Subscribe
    Two female developers collabaorating in their enterprise office space. Featured image for Encouraging women to embrace their cybersecurity superpowers
    June 25, 2021

    Encouraging women to embrace their cybersecurity superpowers

    The cybersecurity challenges of today require a diversity of skills, perspectives, and experiences, yet women remain underrepresented in this field. Girl Security and Microsoft Security are forging a new fellowship around a shared commitment to make cybersecurity more accessible to all, especially girls and women.
    Read more Encouraging women to embrace their cybersecurity superpowers
    Real people, real offices. Black female developer speaking in front of a white board during team stand up meeting. Featured image for Strategies, tools, and frameworks for building an effective threat intelligence team
    June 22, 2021

    Strategies, tools, and frameworks for building an effective threat intelligence team

    Red Canary Director of Intelligence Katie Nickels shares her thoughts on strategies, tools, and frameworks to build an effective threat intelligence team.
    Read more Strategies, tools, and frameworks for building an effective threat intelligence team
    Featured image for Microsoft announces recipients of academic grants for AI research on combating phishing
    June 18, 2021

    Microsoft announces recipients of academic grants for AI research on combating phishing

    Congratulations to the winners of the Microsoft Security AI RFP, which called for AI research on the threat of phishing and approaches for defending against it. We cannot wait to work with you to invent the future of security together.
    Read more Microsoft announces recipients of academic grants for AI research on combating phishing
    Male bank worker sitting in café restaurant using convertible laptop as tablet Featured image for Improve your threat detection and response with Microsoft and Wortell
    June 17, 2021

    Improve your threat detection and response with Microsoft and Wortell

    Managed detection and response services to reduce alert fatigue, mitigate attacks, and gain proactive threat hunting capabilities.
    Read more Improve your threat detection and response with Microsoft and Wortell
    A female employee wearing a mask and talking on a video call with hand sanitizer on her desk, socially distancing from others. Featured image for Afternoon Cyber Tea: Microsoft’s cybersecurity response to COVID-19
    June 15, 2021

    Afternoon Cyber Tea: Microsoft’s cybersecurity response to COVID-19

    Microsoft Chief Information Security Officer Bret Arsenault discusses Microsoft’s response to COVID-19 and the new cybersecurity threats that have emerged.
    Read more Afternoon Cyber Tea: Microsoft’s cybersecurity response to COVID-19
    Featured image for Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign
    June 14, 2021

    Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign

    Microsoft 365 Defender researchers recently uncovered and disrupted a large-scale business email compromise (BEC) infrastructure hosted in multiple web services. Attackers used this cloud-based infrastructure to compromise mailboxes via phishing and add forwarding rules, enabling these attackers to get access to emails about financial transactions.
    Read more Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign
    Developer manager collaborates with developer in enterprise developer work space. Featured image for How purple teams can embrace hacker culture to improve security
    June 10, 2021

    How purple teams can embrace hacker culture to improve security

    Hacker House co-founder and CEO Matthew Hickey introduces the concept of purple teaming and how a purple team can benefit an organization.
    Read more How purple teams can embrace hacker culture to improve security
    Looking into a conference room or board room meeting including people sitting around table in a room with international time clocks. Featured image for CRSP: The emergency team fighting cyber attacks beside customers
    June 9, 2021

    CRSP: The emergency team fighting cyber attacks beside customers

    CRSP is a worldwide team of cybersecurity experts operating in most countries, across all organizations, with deep expertise to secure an environment post-security breach and to help you prevent a breach in the first place.
    Read more CRSP: The emergency team fighting cyber attacks beside customers
    Female office worker at workstation near window, looking at desktop monitor (screen not shown). Open laptop also on desk (screen not shown). Featured image for Optimize security with Azure Firewall solution for Azure Sentinel
    June 8, 2021

    Optimize security with Azure Firewall solution for Azure Sentinel

    We’re excited to announce seamless integration between Azure Firewall and Azure Sentinel. Now, you can get both detection and prevention in the form of an easy-to-deploy Azure Firewall solution for Azure Sentinel.
    Read more Optimize security with Azure Firewall solution for Azure Sentinel
    Small business male achieving outside the office (mobile) using a phone. Featured image for Hart and Microsoft announce partnership to incorporate ElectionGuard
    June 3, 2021

    Hart and Microsoft announce partnership to incorporate ElectionGuard

    On Thursday, June 3rd, via a joint press release on Microsoft Stories, Hart InterCivic and Microsoft have announced a partnership to incorporate ElectionGuard software developed by Microsoft into Hart’s Verity voting systems.
    Read more Hart and Microsoft announce partnership to incorporate ElectionGuard
    Shot of a group of businesswomen using a laptop during a meeting at work. Featured image for Afternoon Cyber Tea: Cybersecurity challenged to meet diversity goals
    June 3, 2021

    Afternoon Cyber Tea: Cybersecurity challenged to meet diversity goals

    RevolutionCyber Founder and CEO Jules Okafor shares what organizations can do to tackle business challenges and support diversity in cybersecurity.
    Read more Afternoon Cyber Tea: Cybersecurity challenged to meet diversity goals
    Man in a collared shirt working on a server station inside a secure room. Coworkers and large monitors are in the background. Featured image for odix and Microsoft: Protecting users against malware attacks with free FileWall license
    June 2, 2021

    odix and Microsoft: Protecting users against malware attacks with free FileWall license

    FileWall brings malware protection capabilities by providing an essential added layer of deep file inspection technology.
    Read more odix and Microsoft: Protecting users against malware attacks with free FileWall license
    • 1
    • 2
    • 3
    • …
    • 226
    • Next Page

    Get started with Microsoft Security

    Microsoft is a leader in cybersecurity, and we embrace our responsibility to make the world a safer place.

    Learn more Get started with Microsoft Security
    Banner that reads "protect it all with Microsoft Security"
    Get all the news, updates, and more at
    @MSFTSecurity twitter
    What's new
    • Surface Laptop 4
    • Surface Laptop Go
    • Surface Go 2
    • Surface Pro X
    • Surface Duo
    • Microsoft 365
    • Windows 10 apps
    • HoloLens 2
    Microsoft Store
    • Account profile
    • Download Center
    • Microsoft Store support
    • Returns
    • Order tracking
    • Virtual workshops and training
    • Microsoft Store Promise
    • Financing
    Education
    • Microsoft in education
    • Office for students
    • Office 365 for schools
    • Deals for students & parents
    • Microsoft Azure in education
    Enterprise
    • Azure
    • AppSource
    • Automotive
    • Government
    • Healthcare
    • Manufacturing
    • Financial services
    • Retail
    Developer
    • Microsoft Visual Studio
    • Windows Dev Center
    • Developer Center
    • Microsoft developer program
    • Channel 9
    • Microsoft 365 Dev Center
    • Microsoft 365 Developer Program
    • Microsoft Garage
    Company
    • Careers
    • About Microsoft
    • Company news
    • Privacy at Microsoft
    • Investors
    • Diversity and inclusion
    • Accessibility
    • Security
    English (United States)
    • Sitemap
    • Contact Microsoft
    • Privacy
    • Manage cookies
    • Terms of use
    • Trademarks
    • Safety & eco
    • About our ads
    • © Microsoft 2021