Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
Hacker House co-founder and CEO Matthew Hickey introduces the concept of purple teaming and how a purple team can benefit an organization. -
Mitigate OT security threats with these best practices
Chris Sistrunk, a Technical Manager in Mandiant’s ICS/OT Consulting practice, shares best practices to improve operational technology security. -
Securing a new world of hybrid work: What to know and what to do
Security continues to be a number one priority for our customers, especially as many companies around the world are looking to transition from remote work to hybrid. -
How to secure your hybrid work world with a Zero Trust approach
We are operating in the most complex cybersecurity landscape we’ve ever seen. -
How to apply a Zero Trust approach to your IoT solutions
A rapid proliferation of IoT has opened unsupervised doors to cybercriminals. -
Zero Trust: 7 adoption strategies from security leaders
How can your organization move to a Zero Trust security model? Ten executive security leaders met virtually to share strategies that been effective for them. -
How to build a successful application security program
Tanya Janca, Founder of the We Hack Purple Academy, talks with Microsoft about how to build an application security program and measure its success. -
How one data scientist is pioneering techniques to detect security threats
Data science is an increasingly popular field of study that’s relevant to every industry. -
5 steps to enable your corporate SOC to rapidly detect and respond to IoT/OT threats
As organizations connect massive numbers of IoT/OT devices to their networks to optimize operations, boards and management teams are increasingly concerned about the expanding attack surface and corporate liability that they represent. -
4 ways Microsoft is delivering security for all in a Zero Trust world
Today we’re excited to share with you several new innovations across four key areas—identity, security, compliance, and skilling—to give you the holistic security protection you need to meet today’s most challenging security demands. -
Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective
Get insights on how to work with business leaders to manage risk and defend against sophisticated cyber threats. -
6 strategies to reduce cybersecurity alert fatigue in your SOC
Alert fatigue is a top of mind challenge when it comes to security monitoring.