Amplification attacks are one of the most common distributed denial of service (DDoS) attack vectors. These attacks are typically categorized as flooding or volumetric attacks, where […]
“Compliance is all about risk management and lessening risk, and the same is true of Zero Trust.” —Abbas Kudrati What’s risk management and why is it […]
Microsoft security researchers recently observed that web skimming campaigns now employ various obfuscation techniques to deliver and hide skimming scripts. It’s a shift from earlier tactics […]
Data is the lifeblood of any organization. Whether you’re a Chief Information Security Officer (CISO) or aspiring to become one, protecting sensitive business data will be […]
This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. The acceleration of cloud journeys fueled by the […]
Successful small business owners are likely to agree on one thing: you cannot do it alone. Running a business with tighter margins and fewer staff than […]
As notable cybersecurity breaches occur more frequently, demand for tech professionals with comprehensive security training remains high. To help address this demand for qualified workers, Microsoft […]
Prioritizing online security continues to be critical for everyone who touches and manages online and cloud-based information. Many have a story about a company or customer […]
Who is CRSP? The Microsoft Compromise Recovery Security Practice (CRSP) is a worldwide team of cybersecurity experts operating in most countries, across both public and private […]