AZURE COMPUTE |
|||
MICROSOFT (formerly |
|||
2021 |
|||
Nov 17 |
NextGen Multi Cloud CSPM in Microsoft Defender for |
||
Nov 16 |
Azure |
||
Oct 27 |
Azure Defender for SQL |
||
Oct 26 |
Manage Your Security Risk and Compliance Requirements with Azure Security |
||
Oct 20 |
What’s New in the Last 6 Months |
||
Oct 5 |
Better Together: Azure Defender, Azure Sentinel, and M365 Defender |
||
Aug 26 |
Better Together | Azure Security Center and Microsoft Defender for |
||
Jul 22 |
Manejo |
|
|
May 13 |
Azure |
||
Apr 29 |
Demystifying |
||
Apr 28 |
Automate(d) |
||
Mar 9 |
Azure |
||
Feb 23 |
Best Practices for Improving Your Secure Score |
||
Jan 7 |
Azure service layers protection |
||
2020 |
|||
Dec 7 |
Investigating Azure Security Center alerts using |
||
Nov 30 |
Azure Defender for SQL Anywhere |
||
Nov 9 |
Ignite 2020 Announcements |
||
Nov 2 |
Enhance IoT Security & Visibility with Azure Defender and Azure |
||
Oct 28 |
Multi-Cloud support in Azure Security Center |
||
Oct 26 |
VM Protection |
||
Mar 11 |
Security Benchmark Policy |
||
Feb 20 |
Secure Score enhanced model |
||
MICROSOFT DEFENDER FOR CLOUD APPS (formerly |
|||
2021 |
|||
Aug 17 |
Protect your Slack Deployment using Microsoft Cloud |
||
Jun 8 |
Protect Your Salesforce Environment Using MCAS |
||
May 25 |
Improve Your AWS Security Posture Using MCAS |
||
May 12 |
Protect Your Box Deployment Using MCAS |
||
May 11 |
How to Protect Your GitHub Environment Using MCAS |
||
2020 |
|||
Apr 15 |
Enabling Secure Remote Work |
||
MICROSOFT DEFENDER FOR ENDPOINT |
|||
2021 |
|||
May 18 |
Stopping Cabanak+FIN7: Understanding the MITRE |
||
2020 |
|||
Sep 16 |
Get started with Microsoft Defender ATP: from zero to |
||
Jul 7 |
Deploy MDATP capabilities using a phased roadmap |
||
Apr 2 |
End-to-end security for your endpoints |
||
MICROSOFT DEFENDER FOR IDENTITY |
|||
2021 |
|||
Oct 6 |
Microsoft Defender for Identity’s Latest Detection |
||
Jun 22 |
MDI in the Microsoft 365 Security Center |
||
Jun 1 |
Detection Deep Dive with Defender for Identity’s |
||
Mar 23 |
Proactive Identity Posture Management |
||
MICROSOFT DEFENDER FOR IoT (formerly Azure Defender for IoT) |
|||
2021 |
|||
Oct 19 |
Agent Based Solution for IoT Device |
||
Jan 20 |
Leveraging OT Behavioral Analytics and Zero Trust for |
||
2020 |
|||
Sep 17 |
MITRE ATT&CK for ICS: CyberX Demo and Azure |
||
MICROSOFT SENTINEL (formerly Azure Sentinel) |
|||
2021 |
|||
Nov 16 |
Create |
||
Nov 15 |
Improving |
||
Nov 10 |
Decrease Your SOC’s MTTR (Mean Time to Respond) by |
||
Nov 9 |
SAP |
||
Nov 8 |
Latest Innovations for Microsoft’s Cloud Native SIEM |
||
Oct 28 |
What’s New in Azure Sentinel Automation |
||
Oct 25 |
Explore the Power of Threat Intelligence in Azure |
||
Oct 18 |
SAP |
||
Oct 11 |
Become a Notebooks Ninja – Getting Started with |
||
Oct 6 |
Turbocharging ASIM: Making Sure Normalization Helps Rather Than Impacting It |
||
Sep 29 |
Better Together | OT and IoT Attack Detection, |
||
Sep 15 |
What’s New in the Last 6 Months |
||
Sep 14 |
Learn About Customizable Anomalies and How to Use |
||
Aug 18 |
Fusion ML Detections with Scheduled Analytics Rules |
||
Aug 11 |
Deep Dive into Azure Sentinel Normalizing Parsers and |
||
Jul 28 |
The Information Model: Understanding Normalization in |
||
Jul 20 |
Streamlining your SOC Workflow with Automated |
||
Jul 13 |
Customizing Azure Sentinel with Python – MSTICPy and |
||
Jun 29 |
Threat Intelligence in Action with Anomali |
||
Jun 24 |
Cost Management in Azure Sentinel – Getting the Most |
||
May 26 |
Deep Dive into Azure Sentinel Innovations for RSA |
||
Mar 31 |
Using Azure Data Explorer as Your Long Term Retention |
||
Mar 18 |
Data Collection Scenarios |
||
Feb 18 |
Best Practices for Converting Detection Rules from |
||
Feb 4 |
Accelerate Your Azure Sentinel Deployment with the |
||
Jan 21 |
Auditing and monitoring your Azure Sentinel workspace |
||
Jan 19 |
Azure Notebooks Fundamentals – How to get started |
||
Jan 12 |
Machine Learning detections in the AI-infused Azure |
||
2020 |
|||
Sep 30 |
Unleash your Azure Sentinel automation Jedi tricks |
||
Sep 29 |
Enabling User and Entity Behavior Analytics (UEBA) | |
||
Sep 14 |
Empowering the Azure Sentinel Community with |
||
Sep 9 |
KQL |
||
Sep 2 |
Log Forwarder deep dive | Filtering CEF and Syslog |
||
Aug 19 |
Threat intelligence automation with RiskIQ |
||
Aug 12 |
Threat hunting and reduce dwell times with Azure |
||
Jul 28 |
KQL |
||
Jul 9 |
Workbooks deep dive – Visualize your security threats |
||
Jun 23 |
Multi-tenant investigations |
||
Jun 15 |
Deploying and Managing Azure Sentinel as Code |
||
Jun 2 |
KQL |
||
May 13 |
Using Sigma to accelerate your SIEM transformation to |
||
Apr 22 |
Threat Hunting on AWS using Sentinel |
||
Apr 20 |
MSSP and Distributed Organization Support |
||
Mar 31 |
Extending and Integrating Azure Sentinel (APIs) |
||
Mar 18 |
Deep Dive on Threat Intelligence |
||
Mar 4 |
Recap of RSA 2020 |
||
Feb 19 |
Tackling Identity |
||
Feb 12 |
Deep Dive on Correlation Rules |
||
Jan 29 |
Threat Hunting – revisited |
||
Jan 22 |
End-to-End SOC scenario |
||
MICROSOFT MISCELLANEOUS |
|||
CYBERSECURITY FUNDAMENTALS |
|||
2021 |
|||
Oct 21 |
Hacking |
||
Oct 14 |
Exploiting |
||
Oct 7 |
Combating Manipulated |
||
Jul 1 |
Spa |
||
Jun 15 |
Best |
||
Mar 24 |
Who |
||
Feb 16 |
The |
||
2020 |
|||
Dec 9 |
Microsoft |
||
Oct 29 |
Cybersecurity |
||
DIVERSITY IN CYBERSECURITY |
|||
2021 |
|||
Oct 4 |
Mekonnen Kassa: From a Refugee to Microsoft: Impact |
||
May 27 |
Sarah Young: How Unconventional Career Paths are |
||
Mar 16 |
Sue Loh, software engineer at Microsoft and author of |