Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
The way we work is evolving. Technology enables more effective employees by helping them to be productive where and when they choose. -
Changing the Monolith—Part 4: Quick tech wins for a cloud-first world
Transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people and technology that make up an organization. -
Changing the Monolith—Part 3: What’s your process?
Digital transformation is a daunting task. -
5 identity priorities for 2020
Joy Chik, Corporate Vice President of Identity, shares five priorities central to security that organizations should prioritize in 2020. -
Azure Security Benchmark—90 security and compliance best practices for your workloads in Azure
Azure Security Benchmark offers a collection of over 90 security best practices and recommendations you can employ to increase the overall security and compliance of all your workloads in Azure. -
How companies can prepare for a heightened threat environment
Learn what actions companies can take and controls they can validate in light of the current level of threats, and during any period of heightened risk. -
Changing the monolith—Part 2: Whose support do you need?
Transformation can be a daunting task. In this series, I explore how change is possible when addressing the components of people, process, and technology that make up the organization. -
How to implement Multi-Factor Authentication (MFA)
The goal of MFA implementation is to enable it for all your users, on all of your systems, all of the time. -
Rethinking cyber scenarios—learning (and training) as you defend
Gamified cybersecurity learning is an increasingly important must-have in your SecOps program, from understanding basic concepts all the way into advanced attacker and defense scenarios. -
Changing the monolith—Part 1: Building alliances for a secure culture
Digital transformation is a daunting task. -
CISO series: Lessons learned from the Microsoft SOC—Part 3b: A day in the life
In this next post in our series, we provide insight into a day in the life of our SOC analysts investigating common front door attacks. -
How to secure your IoT deployment during the security talent shortage
It’s complex work to define a security strategy for IoT—especially with a 3-million-person shortage of cybersecurity pros.