10 Dicembre 2025
Clarity in complexity: New insights for transparent email security

As email threats grow more sophisticated and layered security architectures become more common, organizations need clear, data-driven insights to evaluate[…]

Read More
9 Dicembre 2025
Shai-Hulud 2.0: Guidance for detecting, investigating, and defending against the supply chain attack

The Shai‑Hulud 2.0 supply chain attack represents one of the most significant cloud-native ecosystem compromises observed recently. Attackers maliciously modified hundreds[…]

Read More
9 Dicembre 2025
Shai-Hulud 2.0: Guidance for detecting, investigating, and defending against the supply chain attack

The Shai‑Hulud 2.0 supply chain attack represents one of the most significant cloud-native ecosystem compromises observed recently. Attackers maliciously modified hundreds[…]

Read More
9 Dicembre 2025
Changing the physics of cyber defense

The Deputy CISO blog series is where Microsoft  Deputy Chief Information Security Officers (CISOs) share their thoughts on what is most important in[…]

Read More
9 Dicembre 2025
Changing the physics of cyber defense

The Deputy CISO blog series is where Microsoft  Deputy Chief Information Security Officers (CISOs) share their thoughts on what is most important in[…]

Read More
9 Dicembre 2025
Accelerate innovation with AI: Introducing the Product Change Management agent template

In this article Reenergizing change management with AI Powering AI change management end-to-end Transforming change management at Coca-Cola Beverages Africa[…]

Read More