Skip Navigation
Get a Demo
 
Microsoft

The Red Canary Blog

Security teams need an ally to help defend against adversaries. Check out our blog for breaking research and insights into threat detection, intelligence, and incident response.
SUBSCRIBE TO OUR BLOG
Introducing: Red Canary Mac Monitor
Introducing: Red Canary Mac Monitor
eBPFmon: A new tool for exploring and interacting with eBPF applications
eBPFmon: A new tool for exploring and interacting with eBPF applications
Topics (1)
Teaming with Microsoft Copilot for Security
Teaming with Microsoft Copilot for Security
Red Canary brings MDR expertise to Microsoft Azure Cloud
Red Canary brings MDR expertise to Microsoft Azure Cloud
How Red Canary supports Microsoft customers
How Red Canary supports Microsoft customers
When MFA isn’t an option: The legacy of ROPC
When MFA isn’t an option: The legacy of ROPC
Investigating legacy authentication: The curious case of “BAV2ROPC”
Investigating legacy authentication: The curious case of “BAV2ROPC”
Microsoft recognizes Katie Nickels for her impact on the security community
Microsoft recognizes Katie Nickels for her impact on the security community
Improve your cyber threat coverage with Microsoft E5
Improve your cyber threat coverage with Microsoft E5
Tip of the CAP: Getting started with Conditional Access Policies
Tip of the CAP: Getting started with Conditional Access Policies
We’re always looking for new experts to contribute interesting perspectives and improve our blog. Email us at blog@redcanary.com with article pitches, feedback, or just to say hello!

Subscribe to our blog

 
 
Back to Top