unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Evolving Microsoft Security Development Lifecycle (SDL): How continuous SDL can help you build more secure software
The software developers and systems engineers at Microsoft work with large-scale, complex...
2024-3-8 01:0:0 | 阅读: 13 |
收藏
|
Microsoft Security Blog - www.microsoft.com
sdl
security
microsoft
software
development
Enhancing protection: Updates on Microsoft’s Secure Future Initiative
At Microsoft, we’re continually evolving our cybersecurity strategy to stay ahead of thre...
2024-3-7 01:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
sfi
initiative
sdl
Secure SaaS applications with Valence Security and Microsoft Security
This blog post is part of the Microsoft Intelligent Security Association guest blog serie...
2024-3-6 01:0:0 | 阅读: 11 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
valence
posture
identities
Microsoft Secure: Learn expert AI strategy at our online event
As the most influential technology of our lifetime, AI has the power to reshape how organ...
2024-3-5 02:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
copilot
president
Defend against human-operated ransomware attacks with Microsoft Copilot for Security
Organizations everywhere are seeing an increase in human-operated ransomware threats, wit...
2024-3-5 01:0:0 | 阅读: 11 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
copilot
microsoft
ransomware
defender
Microsoft Copilot for Security: The great equalizer for government security
Cybersecurity for government organizations is a game of speed, with cyberattackers wor...
2024-2-27 01:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
copilot
governments
Announcing Microsoft’s open automation framework to red team generative AI Systems
Today we are releasing an open automation framework, PyRIT (Python Risk Identification To...
2024-2-23 01:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
pyrit
generative
teaming
security
microsoft
Get the most out of Microsoft Copilot for Security with good prompt engineering
The process of writing, refining, and optimizing inputs—or “prompts”—to encourage generat...
2024-2-22 01:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
prompts
copilot
generative
promptbook
Navigating NIS2 requirements with Microsoft Security solutions
The Network and Information Security Directive 2 (NIS2) is a continuation and expansion o...
2024-2-21 01:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
nis2
microsoft
cloud
Staying ahead of threat actors in the age of AI
Over the last year, the speed, scale, and sophistication of attacks has increased alongsi...
2024-2-14 20:0:0 | 阅读: 10 |
收藏
|
Microsoft Security Blog - www.microsoft.com
llms
llm
microsoft
openai
typhoon
Cyber Signals: Navigating cyberthreats and strengthening defenses in the era of AI
The world of cybersecurity is undergoing a massive transformation. AI is at the forefront...
2024-2-14 20:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
llms
machine
Microsoft Copilot for Security provides immediate impact for the Microsoft Defender Experts team
Organizations everywhere are on a lightning-fast learning trajectory to understand the po...
2024-2-9 01:0:0 | 阅读: 14 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
copilot
microsoft
defender
leadership
Microsoft Entra Verified ID introduces Face Check in preview
Today, I’m thrilled to announce the expansion of Microsoft Entra Verified ID to include F...
2024-2-7 01:0:0 | 阅读: 8 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
security
assurance
idemia
Connect with Microsoft at these cybersecurity events in 2024
In the cybersecurity industry, there are many events to choose from. You as a cybersecuri...
2024-2-2 02:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
leaders
ignite
3 new ways the Microsoft Intune Suite offers security, simplification, and savings
Today, we are taking a significant step in completing the delivery of functionality we...
2024-2-2 01:0:0 | 阅读: 11 |
收藏
|
Microsoft Security Blog - www.microsoft.com
intune
microsoft
cloud
security
forrester
Join us at InfoSec Jupyterthon 2024
Jupyter notebooks are continuing to grow in popularity in information security as an alte...
2024-1-30 02:0:0 | 阅读: 10 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
notebooks
security
jupyterthon
jupyter
Best practices in moving to cloud native endpoint management
This blog is the second of three that details our recommendation to adopt cloud native...
2024-1-30 01:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cloud
workloads
windows
intune
microsoft
Midnight Blizzard: Guidance for responders on nation-state attack
The Microsoft security team detected a nation-state attack on our corporate systems on Ja...
2024-1-26 08:0:0 | 阅读: 7 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
blizzard
midnight
exchange
malicious
How Datawiza uses Microsoft Entra ID to help universities simplify access
This blog post is part of the Microsoft Intelligent Security Association guest blog serie...
2024-1-25 01:0:0 | 阅读: 9 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
datawiza
peoplesoft
security
entra
Microsoft at Legalweek: Secure data and gain efficiencies with Microsoft Purview eDiscovery enhanced by generative AI
The legal profession is known for being cautious or hesitant to adopt new technologies. H...
2024-1-19 01:0:0 | 阅读: 21 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
ediscovery
purview
legalweek
security
Previous
5
6
7
8
9
10
11
12
Next