Preface

Over the course of my 25+ years in the information technology and security fields, I have had the opportunity to support many organizations with varying security budgets. One common observation I’ve made is the tendency for security strategies to rely on a single set of isolated security technologies. This approach often overlooks the most vulnerable areas, including email clients such as Outlook, document processing software such as Word, and even messaging applications such as Teams.

Unfortunately, even organizations with substantial security budgets lack a focused security strategy that addresses real-world attacks. As a result, many of these organizations experience breaches, some of which go unnoticed until their entire environment ...

Get Mastering Microsoft Defender for Office 365 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.