Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
How can your organization move to a Zero Trust security model? Ten executive security leaders met virtually to share strategies that been effective for them. -
How to build a successful application security program
Tanya Janca, Founder of the We Hack Purple Academy, talks with Microsoft about how to build an application security program and measure its success. -
How one data scientist is pioneering techniques to detect security threats
Data science is an increasingly popular field of study that’s relevant to every industry. -
5 steps to enable your corporate SOC to rapidly detect and respond to IoT/OT threats
As organizations connect massive numbers of IoT/OT devices to their networks to optimize operations, boards and management teams are increasingly concerned about the expanding attack surface and corporate liability that they represent. -
4 ways Microsoft is delivering security for all in a Zero Trust world
Today we’re excited to share with you several new innovations across four key areas—identity, security, compliance, and skilling—to give you the holistic security protection you need to meet today’s most challenging security demands. -
Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective
Get insights on how to work with business leaders to manage risk and defend against sophisticated cyber threats. -
6 strategies to reduce cybersecurity alert fatigue in your SOC
Alert fatigue is a top of mind challenge when it comes to security monitoring. -
How companies are securing devices with Zero Trust practices
Organizations are seeing a substantial increase in the diversity of devices accessing their networks. -
Identity governance: The power of “Why not?”
Innovation requires the courage to take risks and the leadership skills to show others that risks are worth taking. -
The dynamic duo: How to build a red and blue team to strengthen your cybersecurity, Part 2
In this blog, Jake Williams, Founder of Rendition InfoSec, shares his guidance and best practices on how to structure and evolve red and blue teams. -
Using Zero Trust principles to protect against sophisticated attacks like Solorigate
The Solorigate supply chain attack has captured the focus of the world over the last month. -
How IT leaders are securing identities with Zero Trust
The past twelve months have been a remarkable time of digital transformation as organizations, and especially digital security teams, adapt to working remotely and shifting business operations.