Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
Gamified cybersecurity learning is an increasingly important must-have in your SecOps program, from understanding basic concepts all the way into advanced attacker and defense scenarios. -
Changing the monolith—Part 1: Building alliances for a secure culture
Digital transformation is a daunting task. -
CISO series: Lessons learned from the Microsoft SOC—Part 3b: A day in the life
In this next post in our series, we provide insight into a day in the life of our SOC analysts investigating common front door attacks. -
How to secure your IoT deployment during the security talent shortage
It’s complex work to define a security strategy for IoT—especially with a 3-million-person shortage of cybersecurity pros. -
Finding a common language to describe AI security threats
Microsoft published a series of materials that define common vocabulary that can be used to describe intentional and unintentional failures. -
Best practices for adding layered security to Azure security with Check Point’s CloudGuard IaaS
Learn how Check Point CloudGuard IaaS provides an added layer of security for Azure and aligns with Azure security’s best practices. -
Top 6 email security best practices to protect against phishing attacks and business email compromise
What should IT and security teams be looking for in an email security solution to protect all their users, from frontline workers to the C-suite? Here are 6 tips to ensure your organization has a strong email security posture. -
Microsoft’s 4 principles for an effective security operations center
Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC. -
How to avoid getting caught in a “Groundhog Day” loop of security issues
One of the best ways to thwart cybercrime is to involve security experts before deploying new products and services. -
CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools
In the next post of our series, we provide tips on choosing technology to help a security operations center (SOC) be more responsive, effective, and collaborative. -
How to prevent phishing attacks that target your customers with DMARC and Office 365
DMARC security protocol helps you take control of who can send email messages on your behalf, eliminating the ability for cybercriminals to use your domain to send their illegitimate messages. -
Top 5 use cases to help you make the most of your Cloud Access Security Broker
We explore five use cases for CASBs that give you an immediate return on your investment with very little deployment effort.