Defenders wanted—building the new cybersecurity professionals
Learn about all the cybersecurity resources available today and how digital transformation is opening cybersecurity careers to a wider field of candidates.
Learn about all the cybersecurity resources available today and how digital transformation is opening cybersecurity careers to a wider field of candidates.
In this blog, top experts in the industry will share insights on their careers in cybersecurity.
As organizations move their computing from on-premises to the cloud, they realize that leveraging cloud-native security tools can provide additional cost savings and business benefits to their security infrastructure.
Banco Santander Global Head of Security Research Daniel Cuthbert talks with Microsoft about how to use application security testing and testing standards to increase application security.
It’s Cybersecurity Awareness Month. See how you can #BeCyberSmart and help others in your organization be safe.
In the face of increasingly advanced threats, complex multi-cloud environments, and an evolving trust fabric, identity is emerging as a critical player to deliver the next generation of security, governance, and privacy services.
Head of Mandiant Intelligence at FireEye Sandra Joyce talks with Microsoft’s Ann Johnson about the cybersecurity threats to US elections and how to fight them.
LinkedIn Chief Information Security Officer Geoff Belknap talks with Microsoft’s Bret Arsenault about recruiting cybersecurity talent and solving the skills gap.
Phishing and email spoofing not only erode brand trust, but they also leave recipients vulnerable to financial loss and serious invasions of privacy.
DoD and DIB suppliers—see how Microsoft can give your business a competitive edge toward CMMC compliance.
Tall Poppy CEO and Co-founder Leigh Honeywell talks with Microsoft about how companies can support employees who have been targeted for online harassment.
Vodafone Global Cybersecurity Director Emma Smith talks about leading an inclusive workplace and shares security strategies—like how to get rid of passwords.