Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
Today, we are releasing an AI security risk assessment framework as a step to empower organizations to reliably audit, track, and improve the security of the AI systems. -
Stay safe online this holiday shopping season with tips from Microsoft
You may have already noticed this holiday shopping season feels different than those we’ve had before. -
How to investigate service provider trust chains in the cloud
This blog outlines DART’s recommendations for incident responders to investigate potential abuse of these delegated admin permissions, independent of the threat actor. -
How to assess and improve the security culture of your business
Cygenta Co-Founder and Co-Chief Executive Officer Dr. -
Get career advice from 7 inspiring leaders in cybersecurity
In this blog, top experts in the industry will share insights on their careers in cybersecurity. -
Microsoft’s 5 guiding principles for decentralized identities
Microsoft is excited about the opportunity to create a decentralized identity system that increases customer trust and adoption by minimizing data processing and providing the user much greater control of the specific identity data they share and how it will be used. -
Practical tips on how to use application security testing and testing standards
Banco Santander Global Head of Security Research Daniel Cuthbert talks with Microsoft about how to use application security testing and testing standards to increase application security. -
3 key resources to accelerate your passwordless journey
The risks now outweigh the benefits for organizations using passwords as a security mechanism. -
Afternoon Cyber Tea: Learn how to stop misinformation threats from nation-state bad actors
Head of Mandiant Intelligence at FireEye Sandra Joyce talks with Microsoft’s Ann Johnson about the cybersecurity threats to US elections and how to fight them. -
3 steps to prevent and recover from ransomware
Learn real-world steps for protecting against the latest ransomware and other malicious cyberattacks. -
How to prepare for CMMC compliance as a defense industrial base supplier using the Microsoft cloud
DoD and DIB suppliers—see how Microsoft can give your business a competitive edge toward CMMC compliance.