General
- Understanding and mitigating security risks in MCP implementations
- 14 Secure Coding Tips: Learn from the Experts at @Build
- Microsoft’s Secure by Design journey: One year of success
- Explore how to secure AI by attending our Learn Live Series
- How cyberattackers exploit domain controllers using ransomware
- Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity
- Tech Accelerator: Azure security and AI adoption
- Transforming public sector security operations in the AI era
Threat Intelligence & ESAM
- Guidance for handling CVE-2025-30065 using Microsoft Security capabilities
- Guidance for handling CVE-2025-31324 using Microsoft Security capabilities
- Understanding the threat landscape for Kubernetes and containerized assets
- Cyber Signals Issue 9 | AI-powered deception: Emerging fraud threats and countermeasures
- Threat actors misuse Node.js to deliver malware and other malicious payloads
- Exploitation of CLFS zero-day leads to ransomware activity
Azure Security & Defender for Cloud News
- Protect what matters to your organization using filtering in Defender for Storage
- Protecting Your Azure Key Vault: Why Azure RBAC Is Critical for Security
- RSAC™ 2025: Unveiling new innovations in cloud and AI security
- SANS | Microsoft Cloud Security Tech Talk at Spring Cyber Solutions Fest 2025 – V
- SANS | Microsoft Cloud Security Keynote at Spring Cyber Solutions Fest 2025 – V
- SANS Webcast | Securing the Future with Microsoft Defender for Cloud Best Practices and Insights -V
- Securing Custom Built AI Applications with Microsoft Defender for Cloud
- What’s new in Defender for Cloud features
Sentinel News
- Announcing Rich Text for Case Management
- RSAC 2025 new Microsoft Sentinel connectors announcement
- Transitioning from the HTTP Data Collector API to the Log Ingestion API…What does it mean for me?
- Microsoft Sentinel for SAP: New Security Content Goes Beyond Agentless
- Enhance mobile security with the Samsung Knox solution for Microsoft Sentinel
- General Availability of on-demand scanning in Defender for Storage
- The Unified SecOps Experience Using Microsoft Sentinel’s Latest Features – V
What’s New in Microsoft Sentinel and the Unified Security Operations Platform -V - What’s new in Microsoft Sentinel
Defender for IoT
Microsoft Entra
- Service principal required for Microsoft Entra ID
- Advanced deployment guide for Conditional Access Policy templates
- Connect with Microsoft Entra at upcoming events
- 425 Show | Global Secure Access Proof-of-Concept Deep Dive – V
- 425 Show | Successful Deployment of Global Secure Access -V
- Simplify MFA Compliance with FIDO2 Security Keys-V
- What’s new in Entra ID
Device Management & Protection (Intune)
- Achieve greater security with Intune and Microsoft 365
- Faster, more personalized service begins at the frontline with Microsoft Intune
- What’s new in Microsoft Intune
M365 Defender (Defender for Office, Defender for Endpoint, Defender for Identity, Defender for Cloud Apps)
- Multi Workspace for Single tenant is now in Public Preview in Microsoft’s unified SecOps platform
- Automatic attack disruption: Enhanced containment for critical assets and shadow IT
- SOC can see Microsoft analysis for Third-party add-in user report
- Expanding Cross Cloud Multitenant Security Operations for Government Customers
- Empowering SOC Analysts: Investigating Identity Threats with Microsoft Defender XDR
Protecting Microsoft Teams with Defender for Office 365 -V - Saas Security Exposure Reduction via the Exposure Management Platform-V
Secure Your Servers with Microsoft’s Server Protection Solution-V - What’s new in Microsoft Defender XDR
- What’s new in Microsoft Defender for Endpoint
- What’s new in Microsoft Defender for Office 365
- What’s new in Microsoft Defender for Identity
- What’s new in Microsoft Defender for Cloud Apps
Copilot for Security
- Securely integrate On-Prem and Self-Hosted VM instances of Splunk with Microsoft Security Copilot
- Using Security Copilot to Proactively Identify and Prioritize Vulnerabilities
- Blog Series: Charting Your Path to Cyber Resiliency
- Microsoft Copilot for Security | Security Copilot AMA – V
- Microsoft Copilot for Security Skilling Series: Automating Workflows w/ Logic Apps -V
- What’s new in Microsoft Security Copilot?
Purview – Compliance & Governance
- “Build Your Own” O365 Data Protection Impact Assessment for the Public Sector
- Share Your Experience with Microsoft Purview on Gartner Peer Insights!
- How to deploy Microsoft Purview DSPM for AI to secure your AI apps
- Upcoming changes to Microsoft Purview eDiscovery
- Getting started with the new Purview Content Search
- General Availability: Dynamic watermarking for sensitivity labels with user-defined permissions
- New Purview pricing options for protecting AI apps and agents
- The Crucial Role of Data Security Posture Management in the AI Era
- Getting started with the eDiscovery APIs
- How to use DSPM for AI Data Risk Assessment to Address Internal Oversharing
- Explore practical best practices to secure your data with Microsoft Purview
- Microsoft Purview eDiscovery is getting a unified, streamlined experience starting May 26, 2025!
- eDiscovery New User Experience and Retirement of Classic-V
- What’s new in Microsoft Purview
Learning