Microsoft Security Blog

Microsoft Security Blog Expert coverage of cybersecurity topics

  • Microsoft Purview innovations for your Fabric data: Unify data security and governance for the AI era
    by Rudra Mitra on 16 September 2025 at 4:00 pm

    The Microsoft Fabric and Purview teams are thrilled to participate in the European Microsoft Fabric Community Conference. The post Microsoft Purview innovations for your Fabric data: Unify data security and governance for the AI era appeared first on Microsoft Security Blog.

  • Azure mandatory multifactor authentication: Phase 2 starting in October 2025
    by Joy Shah and Neha Kulkarni on 5 September 2025 at 3:00 pm

    Microsoft Azure is announcing the start of Phase 2 multi-factor authentication enforcement at the Azure Resource Manager layer, starting October 1, 2025. The post Azure mandatory multifactor authentication: Phase 2 starting in October 2025 appeared first on Microsoft Security Blog.

  • Storm-0501’s evolving techniques lead to cloud-based ransomware
    by Microsoft Threat Intelligence on 27 August 2025 at 4:00 pm

    Financially motivated threat actor Storm-0501 has continuously evolved their campaigns to achieve sharpened focus on cloud-based tactics, techniques, and procedures (TTPs). While the threat actor has been known for targeting hybrid cloud environments, their primary objective has shifted from deploying on-premises endpoint ransomware to using cloud-based ransomware tactics. The post Storm-0501’s evolving techniques lead to cloud-based ransomware appeared first on Microsoft Security Blog.

  • Microsoft ranked number one in modern endpoint security market share third year in a row
    by Rob Lefferts on 27 August 2025 at 3:00 pm

    For a third year a row, Microsoft has been named the number one leader for endpoint security market share, as featured in a new IDC report. The post Microsoft ranked number one in modern endpoint security market share third year in a row appeared first on Microsoft Security Blog.

  • Securing and governing the rise of autonomous agents​​
    by Igor Sakhnov on 26 August 2025 at 4:00 pm

    Hear directly from Corporate Vice President and Deputy Chief Information Security Officer (CISO) for Identity, Igor Sakhnov, about how to secure and govern autonomous agents. This blog is part of a new ongoing series where our Deputy CISOs share their thoughts on what is most important in their respective domains. In this series you will get practical advice, forward-looking commentary on where the industry is going, things you should stop doing, and more. ​ The post Securing and governing the rise of autonomous agents​​ appeared first on Microsoft Security Blog.