What Generation Z can teach us about cybersecurity
Girl Security National Security Fellowship participants share Generation Z perspectives on privacy and other cybersecurity issues that can help inform the industry.
Girl Security National Security Fellowship participants share Generation Z perspectives on privacy and other cybersecurity issues that can help inform the industry.
A holistic approach to data protection can deliver better results across the organization. In this post, we share three steps that can get your organization closer.
20 years ago this week, Bill Gates sent a now-famous email to all Microsoft employees announcing the creation of the Trustworthy Computing (TwC) initiative. The initiative was intended to put customer security, and ultimately customer trust, at the forefront for all Microsoft employees.
Heath Adams, Chief Executive Officer at TCM Security, offers practical advice on how to build a security team.
Total Economic Impact™ study conducted by Forrester Consulting and commissioned by Microsoft reveals cost savings and business benefits enabled by Zero Trust.
Get expert advice on how to bridge gaps between your SOC and NOC and enable Zero Trust security in today’s rapidly evolving threat landscape.
Taurus SA Co-founder and Chief Security Officer Jean-Philippe “JP” Aumasson shares how the discipline of cryptography will impact cybersecurity strategy.
Cellebrite Senior Director of Digital Intelligence Heather Mahalik offers an inside look at mobile forensics and shares how to think about the function in your organization.
You may have already noticed this holiday shopping season feels different than those we’ve had before. Headlines about supply chain issues, worker shortages, costs rising—all while the pandemic continues to impact our lives.
Encrypting data—at rest, in transit, and in use—is critical in preparation for a potential breach of your data center.
Learn how Open Systems helps customers make the most of their Microsoft Security investments and bridge the gap between IT and security.
Learn about targets and methods used by today’s nation-state threat actors, and how your organization can create a more secure environment.