Our news
-

Measuring Security Outcomes: What Actually Matters in a Modern SOC
Security metrics for SOC operations should measure outcomes, not activity. This post explains how to move beyond alerts and ticket counts to focus on MTTD, MTTR, and real-world effectiveness, using Microsoft Sentinel and Defender XDR to track meaningful security performance.
-

Where AI Actually Helps Security Teams (and Where It Doesn’t)
AI in security operations is often overhyped, yet its real value comes from strengthening investigation, triage, and signal correlation. This post breaks down where AI truly helps security teams, where it falls short, and how leaders can align it with data strategy, detection engineering, and Microsoft Sentinel to drive meaningful outcomes.
-

Designing a Data Strategy for Modern Security Monitoring
A strong data strategy for modern security monitoring determines whether a SOC produces clarity or noise. This post explores how security leaders should prioritize telemetry, manage ingestion costs, and align data sources with detection engineering and Microsoft Sentinel operations.
-

Why Detection Engineering Strategy Is the Hidden Leadership Advantage in Modern Security
Detection engineering strategy is more than analytics rule creation. This post explores why leaders shape detection quality, how identity and signal design influence outcomes, and why modern security success depends on strategic engineering, not alert volume.
-

Why Modern Security Must Move Beyond Alerts and look at Signals
Modern security operations can no longer scale around alerts alone. This post explores why signal-driven SOC operations are essential for reducing noise, improving investigations, and enabling effective monitoring with platforms like Microsoft Sentinel.
-

Identity Is the New Security Control Plane
Modern security no longer scales around networks or tools. This post explores how identity-centric security architecture reshapes trust, access decisions, and monitoring, and why this shift directly impacts security operations and platforms like Microsoft Sentinel.
-

A New Year Reset for Security Leaders: From Announcements to Architecture
As security enters a new year, leaders face a shift that goes beyond tools and announcements. This post explores what recent industry direction reveals about identity, architecture, and the future of modern security leadership.
-

Reflecting on the Journey Since 2025 with Security Day with Mike: Thank you!
As we close another chapter and look back to when It’s Security Day with Mike! first launched in 2025, I want to take a moment to say Thank You This blog started with a simple goal: translate complex Microsoft security capabilities into practical, real world guidance for technical leaders and practitioners. What it’s grown into
-

Microsoft Ignite 2025 Security Announcements: What Technical Leaders Need to Know
Microsoft Ignite 2025 introduced a major shift in enterprise security, focusing on AI governance, identity centric protection, and autonomous security operations. This post breaks down the most important Microsoft security announcements and what CISOs, Security Architects, and technical leaders need to know.
-

Simple Syslog Ingestion with Microsoft Sentinel Data Lake
Learn how to easily connect your Syslog collector VM, configure a Data Collection Rule, and validate real-time log ingestion into Microsoft Sentinel Data Lake. This step-by-step guide helps you streamline Syslog ingestion for scalable and cost-efficient security analytics.