Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
Security is a major concern of not only major governments but of other entities using Microsoft Power App intake forms. -
CISO Stressbusters: 4 tips for getting the first 6 months right as a new CISO
CISO Stressbusters: CISO guidance and support from around the world. -
Moving to cloud-based SIEM: the cost advantage
Companies weigh multiple factors in any technology implementation, balancing risks with business needs and IT capabilities. -
4 identity partnerships to help drive better security
Microsoft identity engineering has expanded product partnerships to help customers transform digitally with Azure AD-integrated solutions. -
Zero Trust Deployment Guide for devices
Guidance on how to make your endpoints one of the strongest. -
Build support for open source in your organization
5 questions that will help you select open source software and 4 recommendations to smooth the internal approval process. -
Success in security: reining in entropy
Your network is unique. It’s a living, breathing system evolving over time. -
Cybersecurity best practices to implement highly secured devices
If an internet-connected device performs a non-critical function, why does it need to be highly secured? Because any device can be the target of a hacker, and any hacked device can be weaponized. -
CISO stress-busters: post #1 overcoming obstacles
CISO guidance and support from around the world. -
CISO Series: Lessons learned from the Microsoft SOC—Part 3c: A day in the life part 2
This blog wraps up the day in the life of a SOC analyst on the investigation team with insights on remediating incidents, post-incident cleanup, and impact of COVID-19 on the SOC. -
Zero Trust Deployment Guide for Microsoft Azure Active Directory
Microsoft is providing a series of deployment guides for customers who have engaged in a Zero Trust security strategy to configure Azure Active Directory (Azure AD) capabilities. -
Security guidance for remote desktop adoption
As the volume of remote workers quickly increased over the past two to three months, IT teams in many companies have been scrambling to figure out how their infrastructures and technologies will be able to handle the increase in remote connections.