Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
SECUDE has integrated their HALOCAD solution with Microsoft Information Protection SDK which extends the data protection beyond the organization’s IT perimeter. -
A guide to balancing external threats and insider risk
Rockwell Automation Vice President and Chief Information Security Officer Dawn Cappelli talks about assessing, measuring, and protecting against insider risk. -
How to build a privacy program the right way
Asana Privacy Counsel Whitney Merrill, an expert on privacy legal issues, talks with Microsoft about best practices for building a privacy program. -
Preparing for your migration from on-premises SIEM to Azure Sentinel
Learn how to plan and prepare for migration from a traditional on-premises SIEM to Microsoft’s cloud-native SIEM for intelligent security analytics at cloud scale. -
Strategies, tools, and frameworks for building an effective threat intelligence team
Red Canary Director of Intelligence Katie Nickels shares her thoughts on strategies, tools, and frameworks to build an effective threat intelligence team. -
How purple teams can embrace hacker culture to improve security
Hacker House co-founder and CEO Matthew Hickey introduces the concept of purple teaming and how a purple team can benefit an organization. -
Mitigate OT security threats with these best practices
Chris Sistrunk, a Technical Manager in Mandiant’s ICS/OT Consulting practice, shares best practices to improve operational technology security. -
Securing a new world of hybrid work: What to know and what to do
Security continues to be a number one priority for our customers, especially as many companies around the world are looking to transition from remote work to hybrid. -
How to secure your hybrid work world with a Zero Trust approach
We are operating in the most complex cybersecurity landscape we’ve ever seen. -
How to apply a Zero Trust approach to your IoT solutions
A rapid proliferation of IoT has opened unsupervised doors to cybercriminals. -
Zero Trust: 7 adoption strategies from security leaders
How can your organization move to a Zero Trust security model? Ten executive security leaders met virtually to share strategies that been effective for them. -
How to build a successful application security program
Tanya Janca, Founder of the We Hack Purple Academy, talks with Microsoft about how to build an application security program and measure its success.