Tag: Microsoft Security Blog

Enhancing Microsoft 365 security by eliminating high-privilege access

​In this blog you will hear directly from Microsoft’s Deputy Chief Information Security Officer (CISO) for Experiences and Devices, Naresh Kannan, about eliminating high-privileged access across all Microsoft 365 applications. This blog is part of an ongoing series where our…

Unveiling RIFT: Enhancing Rust malware analysis through pattern matching

Threat actors are adopting Rust for malware development. RIFT, an open-source tool, helps reverse engineers analyze Rust malware, solving challenges in the security industry. The post Unveiling RIFT: Enhancing Rust malware analysis through pattern matching appeared first on Microsoft Security…

Navigating cyber risks with Microsoft Security Exposure Management eBook

Microsoft Security Exposure Management’s eBook helps educate teams on how to anticipate threats across hybrid environments, transforming risk into resilience. The post Navigating cyber risks with Microsoft Security Exposure Management eBook appeared first on Microsoft Security Blog. This article has…

Cyber resilience begins before the crisis

Hear directly from Microsoft’s Deputy CISO for Customer Security, Ann Johnson, about the need for proactive planning in cyber incidents. The post Cyber resilience begins before the crisis appeared first on Microsoft Security Blog. This article has been indexed from…

How Microsoft Defender for Endpoint is redefining endpoint security

Learn why many CISOs prefer Microsoft Defender for Endpoint for comprehensive cyberthreat protection across devices and platforms. The post How Microsoft Defender for Endpoint is redefining endpoint security appeared first on Microsoft Security Blog. This article has been indexed from…

How to deploy AI safely

Microsoft Deputy CISO Yonatan Zunger shares tips and guidance for safely and efficiently implementing AI in your organization. The post How to deploy AI safely appeared first on Microsoft Security Blog. This article has been indexed from Microsoft Security Blog…

Defending against evolving identity attack techniques

Threat actors continue to develop and leverage various techniques that aim to compromise cloud identities. Despite advancements in protections like multifactor authentication (MFA) and passwordless solutions, social engineering remains a key aspect of phishing attacks. Implementing phishing-resistant solutions, like passkeys,…

The future of AI agents—and why OAuth must evolve

Our industry needs to continue working together on identity standards for agent access across systems. Read about how Microsoft is building a robust and sophisticated set of agents. The post The future of AI agents—and why OAuth must evolve appeared…

Microsoft extends Zero Trust to secure the agentic workforce

At Microsoft Build 2025, we’re taking important steps to secure the agentic workforce. We are excited to introduce Microsoft Entra Agent ID which extends industry-leading identity management and access capabilities to AI agents. The post Microsoft extends Zero Trust to…

14 secure coding tips: Learn from the experts at Microsoft Build

At Microsoft Build 2025, we’re bringing together security engineers, researchers, and developers to share practical tips and modern best practices to help you ship secure code faster. The post 14 secure coding tips: Learn from the experts at Microsoft Build…

Microsoft announces the 2025 Security Excellence Awards winners

Congratulations to the winners of the Microsoft Security Excellence Awards that recognize the innovative defenders who have gone above and beyond. The post Microsoft announces the 2025 Security Excellence Awards winners appeared first on Microsoft Security Blog. This article has…