Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
How to assess and improve the security culture of your business
Cygenta Co-Founder and Co-Chief Executive Officer Dr. -
Get career advice from 7 inspiring leaders in cybersecurity
In this blog, top experts in the industry will share insights on their careers in cybersecurity. -
Microsoft’s 5 guiding principles for decentralized identities
Microsoft is excited about the opportunity to create a decentralized identity system that increases customer trust and adoption by minimizing data processing and providing the user much greater control of the specific identity data they share and how it will be used. -
Practical tips on how to use application security testing and testing standards
Banco Santander Global Head of Security Research Daniel Cuthbert talks with Microsoft about how to use application security testing and testing standards to increase application security. -
3 key resources to accelerate your passwordless journey
The risks now outweigh the benefits for organizations using passwords as a security mechanism. -
Afternoon Cyber Tea: Learn how to stop misinformation threats from nation-state bad actors
Head of Mandiant Intelligence at FireEye Sandra Joyce talks with Microsoft’s Ann Johnson about the cybersecurity threats to US elections and how to fight them. -
3 steps to prevent and recover from ransomware
Learn real-world steps for protecting against the latest ransomware and other malicious cyberattacks. -
How to prepare for CMMC compliance as a defense industrial base supplier using the Microsoft cloud
DoD and DIB suppliers—see how Microsoft can give your business a competitive edge toward CMMC compliance. -
How to proactively defend against Mozi IoT botnet
Mozi is a peer-to-peer (P2P) botnet that uses a BitTorrent-like network to infect IoT devices such as network gateways and digital video records (DVRs). -
7 ways to harden your environment against compromise
Here at the global Microsoft Compromise Recovery Security Practice (CRSP), we work with customers who have experienced disruptive security incidents to restore trust in identity systems and remove adversary control. -
How to manage a side-by-side transition from your traditional SIEM to Azure Sentinel
Learn whether a transitional or long-term side-by-side deployment can best serve your migration to Microsoft’s cloud-native SIEM.