Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
A Zero Trust strategy grounded in digital empathy will allow you to better protect your mobile workforce. -
How to organize your security team: The evolution of cybersecurity roles and responsibilities
Evolve your security skills and security organization to enable digital transformation. -
CISO Stressbusters: 4 tips for running a highly effective security operation
CISO Stressbusters provides peer to peer guidance and support on how to alleviate stressful situations in the SOC and on the team. -
Guiding principles of our identity strategy: staying ahead of evolving customer needs
A global pandemic made remote access essential and forced many of professionals to accelerate their digital transformation plans. -
CISO Stressbusters: 3 ways to share accountability for security risk management
CISO Stressbusters: CISO guidance and support from around the world. -
Best security, compliance, and privacy practices for the rapid deployment of publicly facing Microsoft Power Apps intake forms
Security is a major concern of not only major governments but of other entities using Microsoft Power App intake forms. -
CISO Stressbusters: 4 tips for getting the first 6 months right as a new CISO
CISO Stressbusters: CISO guidance and support from around the world. -
Moving to cloud-based SIEM: the cost advantage
Companies weigh multiple factors in any technology implementation, balancing risks with business needs and IT capabilities. -
4 identity partnerships to help drive better security
Microsoft identity engineering has expanded product partnerships to help customers transform digitally with Azure AD-integrated solutions. -
Zero Trust Deployment Guide for devices
Guidance on how to make your endpoints one of the strongest. -
Build support for open source in your organization
5 questions that will help you select open source software and 4 recommendations to smooth the internal approval process. -
Success in security: reining in entropy
Your network is unique. It’s a living, breathing system evolving over time.