Agile Business, agile security: How AI and Zero Trust work together
We recently published a new whitepaper that examines the security challenges and opportunities from generative AI.
We recently published a new whitepaper that examines the security challenges and opportunities from generative AI.
Both Microsoft and the National Institute of Standards and Technology (NIST) National Cyber security Center of Excellence (NCCoE) have translated the Zero Trust Architecture (ZTA) and Security Model into practical and actionable deployment. In this blog post, we explore details of their collaboration on a Zero Trust (ZT) implementation and what this learning pathway means for your organization.
Today's world is flooded with definitions and perspectives on Zero Trust, so we are kicking off a blog series to bring clarity to what Zero Trust is and means. This first blog will draw on the past, present, and future to bring a clear vision while keeping our feet planted firmly on the ground of reality.
Learn real-world steps for protecting against the latest ransomware and other malicious cyberattacks.
Learn how your infrastructure and security operations can make you vulnerable to insider threats, ransomware, weaponized AI, and more.
Get insights on how to work with business leaders to manage risk and defend against sophisticated cyber threats.
Whilst this may be uncomfortable reading, the ability to pre-empt and respond quickly to these attacks is now an organizational imperative that requires a level of close collaboration and integration throughout your organization (which may not have happened to date).
These past six months have been a remarkable time of transformation for many IT organizations. With the forced shift to remote work, IT professionals have had to act quickly to ensure people continue working productively from home—in some cases bringing entire organizations online over a weekend. While most started by scaling existing approaches, many organizations […]
Learn about the roots of Zero Trust concept in the Jericho Forum and how they apply to today’s world of remote work more than ever.
All risks have to be viewed through the lens of the business or organization. While information on cybersecurity risks is plentiful, you can’t prioritize or manage any risk until the impact (and likelihood) to your organization is understood and quantified. This rule of thumb on who should be accountable for risk helps illustrate this relationship: […]
Evolve your security skills and security organization to enable digital transformation.
This blog provides lessons learned on how Microsoft hunts for threats in our IT environment and how you can apply these lessons to building or improving your threat hunting program. This is the seventh in a series.