9 Dicembre 2025
Shai-Hulud 2.0: Guidance for detecting, investigating, and defending against the supply chain attack

The Shai‑Hulud 2.0 supply chain attack represents one of the most significant cloud-native ecosystem compromises observed recently. Attackers maliciously modified hundreds[…]

Read More
9 Dicembre 2025
Shai-Hulud 2.0: Guidance for detecting, investigating, and defending against the supply chain attack

The Shai‑Hulud 2.0 supply chain attack represents one of the most significant cloud-native ecosystem compromises observed recently. Attackers maliciously modified hundreds[…]

Read More
9 Dicembre 2025
Changing the physics of cyber defense

The Deputy CISO blog series is where Microsoft  Deputy Chief Information Security Officers (CISOs) share their thoughts on what is most important in[…]

Read More
9 Dicembre 2025
Changing the physics of cyber defense

The Deputy CISO blog series is where Microsoft  Deputy Chief Information Security Officers (CISOs) share their thoughts on what is most important in[…]

Read More
9 Dicembre 2025
[Launched] Generally Available: FIPS compliant mode for Application Gateway V2 SKUs

The Federal Information Processing Standard (FIPS) 140-2 is a US government standard that defines minimum security requirements for cryptographic modules[…]

Read More
9 Dicembre 2025
[Launched] Generally Available: FIPS compliant mode for Application Gateway V2 SKUs

The Federal Information Processing Standard (FIPS) 140-2 is a US government standard that defines minimum security requirements for cryptographic modules[…]

Read More