Are students prepared for real-world cyber curveballs?

Original Post from Microsoft Secure Author: Todd VanderArk With a projected “skills gap” numbering in the…

Foundations of Flow—secure and compliant automation, part 2

Original Post from Microsoft Secure Author: Todd VanderArk In part 1 of this series, we introduced…

Automated incident response in Office 365 ATP now generally available

Original Post from Microsoft Secure Author: Todd VanderArk Security teams responsible for investigating and responding to…

Foundations of Microsoft Flow—secure and compliant automation, part 1

Original Post from Microsoft Secure Author: Todd VanderArk Automation services are steadily becoming significant drivers of…

Deep learning rises: New methods for detecting malicious PowerShell

Original Post from Microsoft Secure Author: Eric Avena Scientific and technological advancements in deep learning, a…

Beyond the buzzwords

Original Post from Microsoft Secure Author: Todd VanderArk When I was a kid, Gilligan’s Island reruns…

Improve security and simplify operations with Windows Defender Antivirus + Morphisec

Original Post from Microsoft Secure Author: Todd VanderArk My team at Morphisec (a Microsoft Intelligent Security…

WordPress Appliance - Powered by TurnKey Linux