Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
To simplify your IoT security journey, today, we’re announcing the availability of Windows IoT Edge Secured-core devices available in the Azure Certified Device catalog from Lenovo, ASUS and AAEON, additionally we’re also announcing the availability of devices that meet the Microsoft sponsored Edge Compute Node protection profile which is governed with industry oversight, from Scalys and Eurotech. -
How one Microsoft software engineer works to improve access management
Igor Sakhnov, corporate vice president of Identity and Network Access Engineering, talks with software engineer Rebecca Nzioki about her journey to computer science and Microsoft’s Africa Development Center in Kenya. -
Why strong security solutions are critical to privacy protection
Former three-term Ontario Information and Privacy Commissioner Ann Cavoukian, Ph. -
How to improve risk management using Zero Trust architecture
Risk management plays a critical role in helping organizations with their security posture enhancement. -
So you want to be a CISO: What you should know about data protection
Learn how insider threats, data siloes, and shifting responsibilities are all affecting data management—and how security professionals can diminish risks to the organization. -
How one senior developer brings the startup spirit to Microsoft
Igor Sakhnov, corporate vice president of Identity and Network Access Engineering, talks with software engineer George Maina about his entrepreneurial journey and the beginnings of the Microsoft Africa Development Center in Kenya. -
Microsoft best practices for managing IoT security concerns
The Internet of Things, or IoT, has expanded beyond the mere concept that it was when first introduced. -
Discover the anatomy of an external cyberattack surface with new RiskIQ report
Learn how supply chains, shadow IT, and other factors are growing the external attack surface—and where you need to defend your enterprise. -
3 strategies to launch an effective data governance plan
A data governance plan can help you effectively govern sensitive data so you can reduce risks from data breaches or leaks. -
3 steps to secure your multicloud and hybrid infrastructure with Azure Arc
In this blog, we will share how you can increase security for on-premises and hybrid infrastructure through offerings including Azure Arc, Microsoft Defender for Cloud, and Secured-core for Azure Stack HCI. -
How Microsoft can help reduce insider risk during the Great Reshuffle
These are exciting and demanding days for organizations adapting to hybrid work realities, including a wider distributed workforce and more rapid change in employee roles. -
The federal Zero Trust strategy and Microsoft’s deployment guidance for all
On January 26, 2022, the White House announced its Federal Zero Trust strategy.