Microsoft Security Blog Expert coverage of cybersecurity topics
- Microsoft Purview innovations for your Fabric data: Unify data security and governance for the AI eraby Rudra Mitra on 16 September 2025 at 4:00 pm
The Microsoft Fabric and Purview teams are thrilled to participate in the European Microsoft Fabric Community Conference. The post Microsoft Purview innovations for your Fabric data: Unify data security and governance for the AI era appeared first on Microsoft Security Blog.
- Azure mandatory multifactor authentication: Phase 2 starting in October 2025by Joy Shah and Neha Kulkarni on 5 September 2025 at 3:00 pm
Microsoft Azure is announcing the start of Phase 2 multi-factor authentication enforcement at the Azure Resource Manager layer, starting October 1, 2025. The post Azure mandatory multifactor authentication: Phase 2 starting in October 2025 appeared first on Microsoft Security Blog.
- Storm-0501’s evolving techniques lead to cloud-based ransomwareby Microsoft Threat Intelligence on 27 August 2025 at 4:00 pm
Financially motivated threat actor Storm-0501 has continuously evolved their campaigns to achieve sharpened focus on cloud-based tactics, techniques, and procedures (TTPs). While the threat actor has been known for targeting hybrid cloud environments, their primary objective has shifted from deploying on-premises endpoint ransomware to using cloud-based ransomware tactics. The post Storm-0501’s evolving techniques lead to cloud-based ransomware appeared first on Microsoft Security Blog.
- Microsoft ranked number one in modern endpoint security market share third year in a rowby Rob Lefferts on 27 August 2025 at 3:00 pm
For a third year a row, Microsoft has been named the number one leader for endpoint security market share, as featured in a new IDC report. The post Microsoft ranked number one in modern endpoint security market share third year in a row appeared first on Microsoft Security Blog.
- Securing and governing the rise of autonomous agentsby Igor Sakhnov on 26 August 2025 at 4:00 pm
Hear directly from Corporate Vice President and Deputy Chief Information Security Officer (CISO) for Identity, Igor Sakhnov, about how to secure and govern autonomous agents. This blog is part of a new ongoing series where our Deputy CISOs share their thoughts on what is most important in their respective domains. In this series you will get practical advice, forward-looking commentary on where the industry is going, things you should stop doing, and more. The post Securing and governing the rise of autonomous agents appeared first on Microsoft Security Blog.