Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
Mastercard Deputy Chief Security Officer Alissa “Dr. -
The art and science behind Microsoft threat hunting: Part 2
In this follow-up post in our series about threat hunting, we talk about some general hunting strategies, frameworks, tools, and how Microsoft incident responders work with threat intelligence. -
The art and science behind Microsoft threat hunting: Part 1
At Microsoft, we define threat hunting as the practice of actively looking for cyberthreats that have covertly (or not so covertly) penetrated an environment. -
Data governance: 5 tips for holistic data protection
Proactive data governance offers a holistic approach that conserves resources and simplifies the protection of your data assets. -
How IT and security teams can work together to improve endpoint security
The threat landscape has changed over the last few years. -
Industrial systems: What it takes to secure and staff them
Chief Executive Officer and owner of Ampere Industrial Security Patrick C. -
How security leaders can help their teams avoid burnout
Maria Markstedter, CEO of Azeria Labs, shares insights on the growing interest in Arm assembly and strategies to help security professionals avoid burnout. -
4 breakthrough ideas for compliance and data security
Learn how Zero Trust and other data protection strategies can help you overcome four key challenges in compliance management and data governance. -
Securing your IoT with Edge Secured-core devices
To simplify your IoT security journey, today, we’re announcing the availability of Windows IoT Edge Secured-core devices available in the Azure Certified Device catalog from Lenovo, ASUS and AAEON, additionally we’re also announcing the availability of devices that meet the Microsoft sponsored Edge Compute Node protection profile which is governed with industry oversight, from Scalys and Eurotech. -
How one Microsoft software engineer works to improve access management
Igor Sakhnov, corporate vice president of Identity and Network Access Engineering, talks with software engineer Rebecca Nzioki about her journey to computer science and Microsoft’s Africa Development Center in Kenya. -
Why strong security solutions are critical to privacy protection
Former three-term Ontario Information and Privacy Commissioner Ann Cavoukian, Ph. -
How to improve risk management using Zero Trust architecture
Risk management plays a critical role in helping organizations with their security posture enhancement.