We’re living in a seismic era for data security. Chief information security officers (CISOs) have to contend with a digital[…]
Leggi di piùAdversary-in-the-middle (AiTM) phishing kits are part of an increasing trend that is observed supplanting many other less advanced forms of[…]
Leggi di piùWomen’s History Month is a special time for me as I reflect on all the great innovations women have made[…]
Leggi di piùThis blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. Data security and compliance[…]
Leggi di piùConsidering mobile users often use the clipboard to copy and paste sensitive information, like passwords or payment information, clipboard contents[…]
Leggi di piùLow-code technology is radically changing the traditional development landscape. And with Microsoft Power Platform and next-generation AI, Microsoft is providing[…]
Leggi di piùThe state of cybersecurity continues to challenge defenders around the world. With hybrid work here to stay and emerging trends[…]
Leggi di piùThe state of cybersecurity continues to challenge defenders around the world. With hybrid work here to stay and emerging trends[…]
Leggi di piùToday we’re on the verge of a monumental shift in the technology landscape that will forever change the security community.[…]
Leggi di piùToday we’re on the verge of a monumental shift in the technology landscape that will forever change the security community.[…]
Leggi di piùIn my practice as a Microsoft Global Black Belt, I focus on the technical and business enablement aspects of protecting[…]
Leggi di piùToday marks a significant shift in endpoint management and security. We’re launching the Microsoft Intune Suite, which unifies mission-critical advanced[…]
Leggi di più