- DocumentSecurity Trends in the Public Sectortéléversé parMSFTSIR
- DocumentSecurity Trends in Retail Organizationstéléversé parMSFTSIR
- DocumentMicrosoft Security Intelligence Report Volume 16téléversé parMSFTSIR
- DocumentSecurity Trends in Healthcaretéléversé parMSFTSIR
- DocumentSecurity Trends in Financial Servicestéléversé parMSFTSIR
- DocumentThe Microsoft Approach to Compliance in the Cloudtéléversé parMSFTSIR
- DocumentAn Introduction to Designing Reliable Cloud Services January 2014téléversé parMSFTSIR
- DocumentData Classification for Cloud Readinesstéléversé parMSFTSIR
- DocumentCISO Perspectives Data Classificationtéléversé parMSFTSIR
- DocumentCybersecurity Risk Paradoxtéléversé parMSFTSIR
- DocumentMicrosoft Security Intelligence Report Volume 15 Key Findings Summarytéléversé parMSFTSIR
- DocumentMicrosoft Security Intelligence Report Volume 15téléversé parMSFTSIR
- DocumentFive Principles for Shaping Cybersecurity Normstéléversé parMSFTSIR
- DocumentAppLocker Design Guidetéléversé parMSFTSIR
- DocumentDeveloping a National Strategy for Cybersecuritytéléversé parMSFTSIR
- DocumentCISO Perspectives on Compliancetéléversé parMSFTSIR
- DocumentCISO Perspectives Today's Risktéléversé parMSFTSIR
- DocumentMicrosoft Security Response Center (MSRC) Progress Report 2013téléversé parMSFTSIR
- DocumentTrends in Cloud Computing Cloud Security Readiness Tooltéléversé parMSFTSIR
- DocumentResilience by Design for Cloud Servicestéléversé parMSFTSIR
- DocumentProblem Management for Reliable Online Servicestéléversé parMSFTSIR
- DocumentWhitepapertéléversé parMSFTSIR
- DocumentMicrosoft Security Intelligence Report Volume 14 Englishtéléversé parMSFTSIR
- DocumentLearn How Socio-economic Factors Affect Regional Malware Ratestéléversé parMSFTSIR
- DocumentDeploying Highly Available and Secure Cloud Solutionstéléversé parMSFTSIR
- DocumentMitigating Pass-The-Hash (PtH) Attacks and Other Credential Theft Techniques_Englishtéléversé parMSFTSIR
- DocumentMicrosoft Malware Protection Center Threat Reporttéléversé parMSFTSIR
- DocumentDetermined Adversaries and Targeted Attackstéléversé parMSFTSIR
- DocumentMicrosoft Security Intelligence Report Volume 13téléversé parMSFTSIR
- DocumentMSRC Progress Report 2012téléversé parMSFTSIR
- DocumentMicrosoft Security Intelligence Report Volume 12téléversé parMSFTSIR
- DocumentMicrosoft Security Intelligence Report Special Edition 10 Year Reviewtéléversé parMSFTSIR
- DocumentMicrosoft Security Intelligence Report Volume 11téléversé parMSFTSIR