Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
The risks now outweigh the benefits for organizations using passwords as a security mechanism. -
Afternoon Cyber Tea: Learn how to stop misinformation threats from nation-state bad actors
Head of Mandiant Intelligence at FireEye Sandra Joyce talks with Microsoft’s Ann Johnson about the cybersecurity threats to US elections and how to fight them. -
3 steps to prevent and recover from ransomware
Learn real-world steps for protecting against the latest ransomware and other malicious cyberattacks. -
How to prepare for CMMC compliance as a defense industrial base supplier using the Microsoft cloud
DoD and DIB suppliers—see how Microsoft can give your business a competitive edge toward CMMC compliance. -
How to proactively defend against Mozi IoT botnet
Mozi is a peer-to-peer (P2P) botnet that uses a BitTorrent-like network to infect IoT devices such as network gateways and digital video records (DVRs). -
7 ways to harden your environment against compromise
Here at the global Microsoft Compromise Recovery Security Practice (CRSP), we work with customers who have experienced disruptive security incidents to restore trust in identity systems and remove adversary control. -
How to manage a side-by-side transition from your traditional SIEM to Azure Sentinel
Learn whether a transitional or long-term side-by-side deployment can best serve your migration to Microsoft’s cloud-native SIEM. -
How to protect your CAD data files with MIP and HALOCAD
SECUDE has integrated their HALOCAD solution with Microsoft Information Protection SDK which extends the data protection beyond the organization’s IT perimeter. -
A guide to balancing external threats and insider risk
Rockwell Automation Vice President and Chief Information Security Officer Dawn Cappelli talks about assessing, measuring, and protecting against insider risk. -
How to build a privacy program the right way
Asana Privacy Counsel Whitney Merrill, an expert on privacy legal issues, talks with Microsoft about best practices for building a privacy program. -
Preparing for your migration from on-premises SIEM to Azure Sentinel
Learn how to plan and prepare for migration from a traditional on-premises SIEM to Microsoft’s cloud-native SIEM for intelligent security analytics at cloud scale. -
Strategies, tools, and frameworks for building an effective threat intelligence team
Red Canary Director of Intelligence Katie Nickels shares her thoughts on strategies, tools, and frameworks to build an effective threat intelligence team.