The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Microsoft
Microsoft Digital Defense Report: Nation-State Threats and Cyber Mercenaries
In part three of this three-part series, Microsoft dissects these twinned threats and what organizations can do to reduce or eliminate their risk.
May 17, 2023
In part three of this three-part series, Microsoft dissects these twinned threats and what organizations can do to reduce or eliminate their risk.
by Microsoft Security, Microsoft
May 17, 2023
4 MIN READ
Article
Microsoft Digital Defense Report: Trends In Device and Infrastructure Attacks
In part two of this three-part series, Microsoft synthesizes the impact of IoT/OT security challenges and offers tips for strengthening security there.
May 10, 2023
In part two of this three-part series, Microsoft synthesizes the impact of IoT/OT security challenges and offers tips for strengthening security there.
by Microsoft Security, Microsoft
May 10, 2023
3 MIN READ
Article
Microsoft Digital Defense Report: Key Cybercrime Trends
In part one of this three-part series, Microsoft details how cybercriminals innovate and evade detection to make money or sow destruction.
May 04, 2023
In part one of this three-part series, Microsoft details how cybercriminals innovate and evade detection to make money or sow destruction.
by Microsoft Security, Microsoft
May 04, 2023
3 MIN READ
Article
As Consumer Privacy Evolves, Here's How You Can Stay Ahead of Regulations
Businesses must leverage state and local guidance — along with technology — to maintain secure, compliant infrastructure.
April 18, 2023
Businesses must leverage state and local guidance — along with technology — to maintain secure, compliant infrastructure.
by Microsoft Security, Microsoft
April 18, 2023
4 MIN READ
Article
How CIEM Can Improve Identity, Permissions Management for Multicloud Deployments
The gap between permissions granted and permissions used exposes organizations to increased risk. (Part two of a two-part series.)
April 11, 2023
The gap between permissions granted and permissions used exposes organizations to increased risk. (Part two of a two-part series.)
by Microsoft Security, Microsoft
April 11, 2023
4 MIN READ
Article
Close the Permissions Gap With Identity and Access Management for Multicloud Workforces
Consolidating identity management on one platform gives organizations real-time access management for all identities on hybrid and multicloud installations. (First of a two-part series.)
April 07, 2023
Consolidating identity management on one platform gives organizations real-time access management for all identities on hybrid and multicloud installations. (First of a two-part series.)
by Microsoft Security, Microsoft
April 07, 2023
3 MIN READ
Article
Deepfakes, Synthetic Media: How Digital Propaganda Undermines Trust
Organizations must educate themselves and their users on how to detect, disrupt, and defend against the increasing volume of online disinformation.
March 14, 2023
Organizations must educate themselves and their users on how to detect, disrupt, and defend against the increasing volume of online disinformation.
by Microsoft Security, Microsoft
March 14, 2023
3 MIN READ
Article
4 Tips to Guard Against DDoS Attacks
Attackers are now using multiple types of distributed denial-of-service (DDoS) attacks to take down sites. Here are some ways to defend and protect.
February 22, 2023
Attackers are now using multiple types of distributed denial-of-service (DDoS) attacks to take down sites. Here are some ways to defend and protect.
by Microsoft Security, Microsoft
February 22, 2023
3 MIN READ
Article
Infrastructure Risks Increase As IT and OT Converge
Explosive growth of devices associated with the Internet of Things and operational technologies gives attackers a larger pool of targets.
February 15, 2023
Explosive growth of devices associated with the Internet of Things and operational technologies gives attackers a larger pool of targets.
by Microsoft Security, Microsoft
February 15, 2023
3 MIN READ
Article
How to Optimize Your Cyber Insurance Coverage
From prevention and detection processes to how you handle policy information, having strong cyber insurance coverage can help mitigate cybersecurity attacks.
February 08, 2023
From prevention and detection processes to how you handle policy information, having strong cyber insurance coverage can help mitigate cybersecurity attacks.
by Microsoft Security, Microsoft
February 08, 2023
3 MIN READ
Article
CISOs Are Focused on These 3 Trends. Are You?
The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.
January 09, 2023
The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.
by Microsoft Security, Microsoft
January 09, 2023
4 MIN READ
Article
6 Ways to Protect Your Organization Against LAPSUS$
Businesses need to educate employees the type of social engineering attacks used by hacking group DEV-0537 (LAPSUS$) and strengthen their security posture.
December 29, 2022
Businesses need to educate employees the type of social engineering attacks used by hacking group DEV-0537 (LAPSUS$) and strengthen their security posture.
by Microsoft Security, Microsoft
December 29, 2022
3 MIN READ
Article
43 Trillion Security Data Points Illuminate Our Most Pressing Threats
A new report helps companies understand an ever-changing threat landscape and how to strengthen their defenses against emerging cybersecurity trends.
December 09, 2022
A new report helps companies understand an ever-changing threat landscape and how to strengthen their defenses against emerging cybersecurity trends.
by Microsoft Security, Microsoft
December 09, 2022
3 MIN READ
Article
Hardening Identities With Phish-Resistant MFA
Extending multifactor authentication to include device identity assurance offers more authentication confidence than what multiple user-identity factors can by themselves.
December 06, 2022
Extending multifactor authentication to include device identity assurance offers more authentication confidence than what multiple user-identity factors can by themselves.
by Microsoft Security, Microsoft
December 06, 2022
4 MIN READ
Article
The New External Attack Surface: 3 Elements Every Organization Should Monitor
In short, the global Internet is now part of your external attack surface. Here’s how to better protect your users and data.
December 05, 2022
In short, the global Internet is now part of your external attack surface. Here’s how to better protect your users and data.
by Microsoft Security, Microsoft
December 05, 2022
3 MIN READ
Article