One problem affecting the enterprise space is ransomware, a type of malware designed to render a computer or its files unusable until you pay a certain amount of money to the attacker. Learn more about this threat and how to deal with a ransomware infection.
EMET 4.0 offers improvements and new features based on Microsoft customer feedback and the new attacks today's IT ecosystem has faced over the last couple years. Explore the new features and learn how to best utilize EMET 4.0 as part of your overall security toolbox.
Sensitive information, corporate intellectual property, financial information, and private personal data is being lost to cyber intrusions targeted at government agencies and private enterprises. Explore some effective protections that you can put in place without a new investment in technology or personnel.
Evaluating a cloud provider needs to be done with care. Learn how to make the evaluation process simpler and easier to ensure that everyone can address the important factors of the cloud selection process.
Learn how to use Microsoft's free Security Compliance Manager tool to help you to monitor patch status, identify changes to the administrators group, and report on the use of whitelists using the desired configuration management feature in System Center Configuration Manager.
Learn how, combined with source address spoofing, an attacker can direct a large volume of network traffic to a target system by initiating relatively small DNS queries so that you can better protect your network from this type of attack.
Each Microsoft security update carries two pieces of information that help with the prioritization process: the severity rating and the Exploitability Index. Explore each of these items in detail and learn how they can add a new dimension of information that can help you prioritize decisions.
Learn how to use the security features in Windows Intune, Microsoft's cloud services solution for PC management and endpoint protection, to implement best practices that can help you better protect your PCs.
Learn how to use the Microsoft Attack Surface Analyzer tool to better understand the aggregate attack surface change that may result from the introduction of line-of-business (LOB) applications to the Windows platform.
Get a brief overview of common threat considerations for Web application development and deployment then find out how you can leverage the Microsoft Simplified Security Development Lifecycle (SDL) to help mitigate those threats while achieving the speed and efficiency of cloud computing.
There have been a number of zero-day vulnerabilities circulating around the Internet recently. Find out how the Enhanced Mitigation Experience Toolkit (EMET) can help you manage security mitigations for your systems
Explore the reasons why home (non-domain) users and those who use enterprise (domain-joined) computers face different vulnerabilities then find a selection of best practices and solutions that should be considered to help protect your users.
Find out how to easily evaluate how well an application and its operating environment stack up against industry privacy and data security best practices, how well they comply with your organization’s privacy and data security policies.
Learn how the Forefront Identity Manager (FIM) 2010 self-service user profile management can be configured for a privacy scenario, enabling end users to selectively control who can view their home phone number.
Microsoft Security Newsletter
Sign up for a free monthly roundup of security news, bulletins, and guidance for IT pros and developers.