Recent Blogs
Where AV helps—and what it may not cover
Antivirus engines and traditional code scanners are highly effective at identifying known or suspicious executable content, such as binaries, scripts, or e...
Apr 24, 202695Views
0likes
0Comments
13 MIN READ
Microsoft will retire the standalone Azure Sentinel portal on March 31, 2027. Most of the conversation around this transition focuses on cost optimization and portal consolidation. That framing under...
Apr 23, 2026577Views
4likes
2Comments
We are excited to introduce the new home of the Microsoft Security Community!
At aka.ms/securitycommunity, you can explore upcoming events, access technical content, and find new ways to connect wi...
Apr 21, 2026467Views
0likes
0Comments
6 MIN READ
Microsoft 365 Copilot is redefining how organizations work, bringing the power of generative AI directly into our secure productivity tools. As Copilot adoption accelerates, we’ve heard that you want...
Apr 21, 20261.3KViews
2likes
0Comments
Strong authentication controls like MFA significantly reduce account compromise — but they don’t eliminate the risk of password exposure. In many organizations, users still interact with legacy syst...
Apr 20, 2026517Views
1like
0Comments
Meet Fabrício Assumpção, a Technical Specialist Architect for a Microsoft Security and Compliance Certified Partner, based in Brazil. Fabrício considers his involvement with the Microsoft Securi...
Apr 15, 2026211Views
2likes
0Comments
Enterprise cybersecurity in large organisations has always been an asymmetric game. But with the rise of AI‑enabled cyber attacks, that imbalance has widened dramatically - particularly for UK an...
Apr 15, 2026361Views
2likes
0Comments
How to set up the Workbook
Use the steps outlined in the Identify and Remediate Credentials article to get the right rules in place to start capturing credential data. You may choose to use custom ...
Apr 15, 2026742Views
2likes
0Comments
3 MIN READ
When Conditional Access policies enforce MFA across all cloud apps and include external users, encrypted attachments may require additional considerations. This post explains why.
This behavior app...
Apr 13, 2026492Views
2likes
0Comments
What is changing?
In early 2024, Azure Key Vault introduced a modernized hardware security module (HSM) platform based on FIPS 140-2 Level 3 certified HSMs. As part of this evolution, the legacy HS...
Apr 13, 2026472Views
0likes
0Comments
Tags
- security416 Topics
- microsoft information protection293 Topics
- microsoft purview292 Topics
- compliance250 Topics
- information protection and governance212 Topics
- microsoft 365169 Topics
- data loss prevention154 Topics
- cloud security142 Topics
- insider risk management121 Topics
- threat protection101 Topics