The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
Building Out the Best Response Playbook for Ransomware Attacks
Mar 28, 2023
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
Building Out the Best Response Playbook for Ransomware Attacks
Mar 28, 2023
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
Building Out the Best Response Playbook for Ransomware Attacks
Mar 28, 2023
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading March 23 Virtual Event | <GET YOUR PASS>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Microsoft
Deepfakes, Synthetic Media: How Digital Propaganda Undermines Trust
Organizations must educate themselves and their users on how to detect, disrupt, and defend against the increasing volume of online disinformation.
March 14, 2023
Organizations must educate themselves and their users on how to detect, disrupt, and defend against the increasing volume of online disinformation.
by Microsoft Security, Microsoft
March 14, 2023
3 MIN READ
Article
4 Tips to Guard Against DDoS Attacks
Attackers are now using multiple types of distributed denial-of-service (DDoS) attacks to take down sites. Here are some ways to defend and protect.
February 22, 2023
Attackers are now using multiple types of distributed denial-of-service (DDoS) attacks to take down sites. Here are some ways to defend and protect.
by Microsoft Security, Microsoft
February 22, 2023
3 MIN READ
Article
Infrastructure Risks Increase As IT and OT Converge
Explosive growth of devices associated with the Internet of Things and operational technologies gives attackers a larger pool of targets.
February 15, 2023
Explosive growth of devices associated with the Internet of Things and operational technologies gives attackers a larger pool of targets.
by Microsoft Security, Microsoft
February 15, 2023
3 MIN READ
Article
How to Optimize Your Cyber Insurance Coverage
From prevention and detection processes to how you handle policy information, having strong cyber insurance coverage can help mitigate cybersecurity attacks.
February 08, 2023
From prevention and detection processes to how you handle policy information, having strong cyber insurance coverage can help mitigate cybersecurity attacks.
by Microsoft Security, Microsoft
February 08, 2023
3 MIN READ
Article
CISOs Are Focused on These 3 Trends. Are You?
The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.
January 09, 2023
The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.
by Microsoft Security, Microsoft
January 09, 2023
4 MIN READ
Article
6 Ways to Protect Your Organization Against LAPSUS$
Businesses need to educate employees the type of social engineering attacks used by hacking group DEV-0537 (LAPSUS$) and strengthen their security posture.
December 29, 2022
Businesses need to educate employees the type of social engineering attacks used by hacking group DEV-0537 (LAPSUS$) and strengthen their security posture.
by Microsoft Security, Microsoft
December 29, 2022
3 MIN READ
Article
43 Trillion Security Data Points Illuminate Our Most Pressing Threats
A new report helps companies understand an ever-changing threat landscape and how to strengthen their defenses against emerging cybersecurity trends.
December 09, 2022
A new report helps companies understand an ever-changing threat landscape and how to strengthen their defenses against emerging cybersecurity trends.
by Microsoft Security, Microsoft
December 09, 2022
3 MIN READ
Article
Hardening Identities With Phish-Resistant MFA
Extending multifactor authentication to include device identity assurance offers more authentication confidence than what multiple user-identity factors can by themselves.
December 06, 2022
Extending multifactor authentication to include device identity assurance offers more authentication confidence than what multiple user-identity factors can by themselves.
by Microsoft Security, Microsoft
December 06, 2022
4 MIN READ
Article
The New External Attack Surface: 3 Elements Every Organization Should Monitor
In short, the global Internet is now part of your external attack surface. Here’s how to better protect your users and data.
December 05, 2022
In short, the global Internet is now part of your external attack surface. Here’s how to better protect your users and data.
by Microsoft Security, Microsoft
December 05, 2022
3 MIN READ
Article
Is MFA the Vegetable of Cybersecurity?
Multifactor authentification is crucial for creating a healthy cybersecurity posture, but many companies are slow to adopt.
December 01, 2022
Multifactor authentification is crucial for creating a healthy cybersecurity posture, but many companies are slow to adopt.
by Andrea Fisher, Security Specialist, Microsoft
December 01, 2022
3 MIN READ
Article
What Every Enterprise Can Learn From Russia’s Cyber Assault on Ukraine
Once isolated occurrences, nation-state attacks are now commonplace; security professionals should know the elements of defense.
November 29, 2022
Once isolated occurrences, nation-state attacks are now commonplace; security professionals should know the elements of defense.
by Microsoft Security, Microsoft
November 29, 2022
3 MIN READ
Article
#BeCyberSmart All Year Round With Educational Resources From Microsoft
Improved cyber hygiene keeps users and their identities, devices, and data more secure and reduces the organization’s risk exposure.
November 21, 2022
Improved cyber hygiene keeps users and their identities, devices, and data more secure and reduces the organization’s risk exposure.
by Microsoft Security, Microsoft
November 21, 2022
3 MIN READ
Article
What Is Top of Mind for CISOs Right Now?
Security executives are leaning into the powerful twinning of XDR and automated management to reduce the risk and impact of ransomware.
November 16, 2022
Security executives are leaning into the powerful twinning of XDR and automated management to reduce the risk and impact of ransomware.
by Microsoft Security, Microsoft
November 16, 2022
4 MIN READ
Article
Extortion Economics: Ransomware's New Business Model
Ransomware-as-a-service lowers the barriers to entry, hides attackers’ identities, and creates multitier, specialized roles in service of ill-gotten gains.
November 08, 2022
Ransomware-as-a-service lowers the barriers to entry, hides attackers’ identities, and creates multitier, specialized roles in service of ill-gotten gains.
by Microsoft Security, Microsoft
November 08, 2022
4 MIN READ
Article
Security Leaders Share 5 Steps to Strengthen Cyber Resilience
These aren't quick fixes, but by prioritizing needs based on risk, organizations can incrementally apply these steps to become more resilient.
November 03, 2022
These aren't quick fixes, but by prioritizing needs based on risk, organizations can incrementally apply these steps to become more resilient.
by Microsoft Security, Microsoft
November 03, 2022
4 MIN READ
Article