Latest Blog Articles
We are excited to announce the Public Preview of Key attestation for Azure Key Vault Managed HSM.
This feature allows you to validate the authenticity of cryptographic keys stored within the hard...
Mar 21, 202568Views
0likes
0Comments
1 MIN READ
We are pleased to announce the general availability of the "1000 collections" in Data Map.
Collections in the Data Map serve as a logical construct designed to organize assets and data sources with...
Mar 20, 2025119Views
0likes
0Comments
Welcome to our Ninja Training for Microsoft Defender for Cloud Apps!
Are you trying to protect your SaaS applications? Are you concerned about the posture of the apps you are using? Is shado...
Mar 20, 2025326Views
2likes
1Comment
As cybersecurity evolves, identifying critical assets becomes an essential step in exposure management, as it allows for the prioritization of the most significant assets. This task is challenging be...
Mar 18, 2025306Views
0likes
0Comments
When you’re secure—innovation happens. But, the fast pace of AI often outpaces traditional security measures, leaving gaps that bad actors can take advantage of. As a security professional, you’re th...
Mar 18, 20251.2KViews
2likes
0Comments
Active Directory Migration Service (ADMS), Active Directory Synchronization Service (ADSS), and Active Directory Group Modernization Service (ADGMS) are cloud-based services within the ADxS services ...
Mar 13, 2025312Views
3likes
0Comments
3 MIN READ
In today’s fast-paced digital landscape, identity migration isn’t just a technical process—it’s a critical step in ensuring business continuity, security, and user satisfaction. That’s where our Iden...
Mar 13, 2025131Views
2likes
0Comments
DLP Analytics has the potential to transform the way that you protect your organization from data loss by identifying and closing data security risks. Let’s take a closer look and explore the advanta...
Mar 13, 20251.5KViews
1like
3Comments
Over the past two years, there has been a significant increase in nation-state attacks leveraging OAuth apps. These attacks often serve as entry points for privilege escalation, lateral movement, and...
Mar 13, 2025423Views
3likes
1Comment
Part 1: What Is Cyber Resiliency and How Do I Get It?
Recently I was on a call with some Security leaders who were interested in how we at Microsoft could help them with cyber resiliency. But when ...
Mar 10, 2025379Views
2likes
2Comments
Resources
Tags
- security309 Topics
- microsoft information protection253 Topics
- microsoft purview211 Topics
- compliance193 Topics
- information protection and governance180 Topics
- microsoft 365130 Topics
- data loss prevention113 Topics
- cloud security103 Topics
- insider risk management87 Topics
- microsoft defender for cloud apps82 Topics