Homepage
Open in app
Sign in
Get started
People & Careers
Digital Transformation
Research
Archive
Microsoft Blog
Digital Transformation
About Identity, Part 2: 3 Common Identity Attacks
About Identity, Part 2: 3 Common Identity Attacks
In the second of this three part series, I identify common identity-related attacks to be aware of, both as an enterprise that needs to…
Seema Kathuria
Sep 9, 2019
Weighing Past and Future Success
Weighing Past and Future Success
Nothing worthwhile is easy. What are you willing to struggle for?
Lucas Dowd
Sep 3, 2019
About Identity, Part 1: Protect your mailbox, protect your digital identity
About Identity, Part 1: Protect your mailbox, protect your digital identity
Trust is eroding — making safeguarding identities critical.
Seema Kathuria
Aug 27, 2019
Top 7 Disruptive Technologies facing Cybersecurity Professionals
Top 7 Disruptive Technologies facing Cybersecurity Professionals
Technology is exciting and constantly changing, but how can we ensure the latest technology is secure?
Berk Veral
Aug 13, 2019
Kevin Nealon Knows Digital Transformation
Kevin Nealon Knows Digital Transformation
Lessons on digital transformation from “Happy Gilmore.”
Lucas Dowd
Feb 13, 2019
When the adversary lurks in your cloud
When the adversary lurks in your cloud
Organizations embracing hybrid and cloud infrastructures are experiencing the benefits of business agility and operational cost savings. But
Seema Kathuria
Jul 23, 2019
Changing the Monolith, Part 4: Quick Tech Wins for a Cloud-First World
Changing the Monolith, Part 4: Quick Tech Wins for a Cloud-First World
Transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people, process, and t
Joseph Davis
Jul 9, 2019
Changing the Monolith, Part 3: What’s Your Process?
Changing the Monolith, Part 3: What’s Your Process?
Transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people, process, and t
Joseph Davis
Jun 13, 2019
Changing the Monolith, Part 2: Building Alliances — Whose Support Do You Need?
Changing the Monolith, Part 2: Building Alliances — Whose Support Do You Need?
Transformation can be a daunting task. In this series, I explore how change is possible when addressing the components of people, process…
Joseph Davis
Jun 4, 2019
The Unsung Hero’s Journey: What comics, online content, and cyber security have in common
The Unsung Hero’s Journey: What comics, online content, and cyber security have in common
How do you teach people to understand, much less care, about security if they don’t know about it in the first place?
Stephanie Lio
May 21, 2019
Changing the Monolith, Part 1: Building Alliances for a Secure Culture
Changing the Monolith, Part 1: Building Alliances for a Secure Culture
Transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people, process, and…
Joseph Davis
May 14, 2019
Governing the Modern Cyber Security Landscape
Governing the Modern Cyber Security Landscape
With the evolution of cloud and automated security solutions, modern security teams are facing a rarely spoken of challenge: Governance
Lucas Dowd
May 7, 2019
Resilience: the key to survival in life and cyberspace
Resilience: the key to survival in life and cyberspace
When you hear the word “resilience”, You may not think of survival first, but it is key for surviving life in the real and digital worlds.
Seema Kathuria
Apr 23, 2019
What do recycling and cybersecurity have in common?
What do recycling and cybersecurity have in common?
When I was young and recycling was introduced in America, my family and I had to separate plastic, paper, glass, and aluminum in separate bi
Lucas Dowd
Apr 11, 2019
Top 5 benefits of using a security framework
Top 5 benefits of using a security framework
Cybersecurity is an overwhelming endeavor, whether you are a business leader, such as the Chief Information Security Officer (CISO), or a…
Seema Kathuria
Mar 26, 2019
How to Benchmark if You’re Doing Cloud Security Right
How to Benchmark if You’re Doing Cloud Security Right
Trying something new is never easy. It’s not always clear what ‘secure’ looks like. Here are a few ways to know when you’ve achieved…
Berk Veral
Mar 19, 2019
Mind The Gap
Mind The Gap
Picture a New York City Subway and consider this analogy: The train is IT. Passengers are your employees. And the audible or visual warning
Lucas Dowd
Mar 7, 2019
Convince Me to Patch: A Haiku Series
Convince Me to Patch: A Haiku Series
I asked a team of security professionals to distill lessons about cyber hygiene into 17-syllable haikus. They delivered. Here’s just a…
Stephanie Lio
Mar 5, 2019
xoxo, the Cloud
xoxo, the Cloud
Love and the cloud — it all comes down to trust. I reflect on shared lessons in love and cloud computing as we approach that time of the…
Seema Kathuria
Feb 27, 2019
About Microsoft Cybersecurity
Latest Stories
Archive
About Medium
Terms
Privacy
Teams