In this blog, Steve Goodman explains the latest security updates and provides links to download the latest updates.
Find articles about securing identities, endpoints, and information for Office 365 and Azure.
In this blog, Patrick Van Bemmelen demonstrates how to protect users against threats with Attack Simulation training.
Part Two: How to use MCAS and PowerAutomate to prevent malicious activity when employees extract confidential corporate information from cloud repositories.
Part One: How to use MCAS and PowerAutomate to prevent malicious activity when employees extract confidential corporate information from cloud repositories.
At Ignite this year, Microsoft announced the release of the Office 365 ATP Recommended Configuration Analyzer, otherwise known as ‘ORCA’. Find out more in this article.
In the last part to this insightful series on account breaches, Tony Akers discusses how to remediate your Office 365 after an account breach.
In Part 3 of the Account Breaches series by security expert Tony Akers, he looks at using the Hawk PowerShell Module for investigating breaches.
In Part Two, of this four-part series on Office 365 account breaches, Tony Akers explores how to use Cloud App Security to investigate a breach.
In this blog MVP Vasil Michev explores the new Supervision Review feature improvements which are now available in some Office 365 tenants.
MVP Vasil Michev takes a first look at the new Security and Compliance Centers released for public preview and shares his thoughts.