Microsoft Defender for Cloud
209 TopicsAccelerate AI adoption with next-gen security and governance capabilities
Generative AI adoption is accelerating across industries, and organizations are looking for secure ways to harness its potential. Today, we are excited to introduce new capabilities designed to drive AI transformation with strong security and governance tools.AMA: CNAPP Demystified
Bring your questions and Ask Microsoft Anything (AMA) as we explore the risks and threats for cloud native applications and how misconfigurations can lead to compromise. This session is part of the Microsoft Security Tech Accelerator. RSVP for event reminders, add it to your calendar, and post your questions and comments below! This session will also be recorded and available on demand shortly after conclusion of the live event.AMA: Microsoft Defender for Cloud
Have questions on how to strengthen your data security posture? Ask Microsoft Anything (AMA)! We'll answer those and more as we explain how a Microsoft Defender cloud security posture management (CSPM) plan enables you to proactively identify and prioritize critical risks to sensitive data. This session is part of the Microsoft Security Tech Accelerator. RSVP for event reminders, add it to your calendar, and post your questions and comments below! This session will also be recorded and available on demand shortly after conclusion of the live event.Implementing Defender for Cloud, Microsoft’s CNAPP to embed security from code to cloud
Explore key Cloud Native Application Protection Platform (CNAPP) implementation strategies for protecting multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime and breaking the silos between developers, security admins, and SOC analyst teams with Microsoft Defender for Cloud. This session is part of the Microsoft Secure Tech Accelerator. RSVP for event reminders, add it to your calendar, and post your questions and comments below! This session will also be recorded and available on demand shortly after conclusion of the live event.Microsoft Security Exposure Management Graph: Prioritization is the king
Unlock the full potential of Microsoft’s Security Exposure Management raph in Advanced Hunting. This blog post delves into essential concepts like Blast Radius and Asset Exposure, equipping you with powerful queries to enhance your security posture.New Blog | Keep your online activity safer on public Wi-Fi with Microsoft Defender for individuals
ByAshwin PR Figure 1 - Privacy protection UI on the Defender mobile app Public Wi-Fi is usually free, easy and convenient, but not necessarily always safe. As they say, there is no ‘free lunch’ . Microsoft Defender for individuals 1 aims to provide a safer online experience wherever you go and late last year, we introduced privacy protection (VPN) 2 , so you can browse without having to worry about your personal data being intercepted over an unsecure Wi-Fi connection. Read the full post here:Keep your online activity safer on public Wi-Fi with Microsoft Defender for individualsArchitecting secure Gen AI applications: Preventing Indirect Prompt Injection Attacks
Indirect Prompt Injection is an emerging attack vector specifically designed to target and exploit Generative AI applications powered by large language models (LLMs). But what exactly is indirect prompt injection, and how can you build applications that are more resilient and less susceptible to abuse by attackers?Guided walkthrough of the Microsoft Purview extended report experience
This is a step-by-step guided walkthrough of the Microsoft Purview extended report experience and how it can empower your organization to understand the cyber security risks in a context that allows them to achieve more. By focusing on the information and organizational context to reflect the real impact/value of investments and incidents in cyber.