Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
Joy Chik, Corporate Vice President of Identity, shares five priorities central to security that organizations should prioritize in 2020.
-
Azure Security Benchmark—90 security and compliance best practices for your workloads in Azure
Azure Security Benchmark offers a collection of over 90 security best practices and recommendations you can employ to increase the overall security and compliance of all your workloads in Azure. -
How companies can prepare for a heightened threat environment
Learn what actions companies can take and controls they can validate in light of the current level of threats, and during any period of heightened risk. -
Changing the monolith—Part 2: Whose support do you need?
Transformation can be a daunting task. In this series, I explore how change is possible when addressing the components of people, process, and technology that make up the organization. -
How to implement Multi-Factor Authentication (MFA)
The goal of MFA implementation is to enable it for all your users, on all of your systems, all of the time. -
Rethinking cyber scenarios—learning (and training) as you defend
Gamified cybersecurity learning is an increasingly important must-have in your SecOps program, from understanding basic concepts all the way into advanced attacker and defense scenarios. -
Changing the monolith—Part 1: Building alliances for a secure culture
Digital transformation is a daunting task. -
CISO series: Lessons learned from the Microsoft SOC—Part 3b: A day in the life
In this next post in our series, we provide insight into a day in the life of our SOC analysts investigating common front door attacks. -
How to secure your IoT deployment during the security talent shortage
It’s complex work to define a security strategy for IoT—especially with a 3-million-person shortage of cybersecurity pros. -
Finding a common language to describe AI security threats
Microsoft published a series of materials that define common vocabulary that can be used to describe intentional and unintentional failures. -
Best practices for adding layered security to Azure security with Check Point’s CloudGuard IaaS
Learn how Check Point CloudGuard IaaS provides an added layer of security for Azure and aligns with Azure security’s best practices. -
Top 6 email security best practices to protect against phishing attacks and business email compromise
What should IT and security teams be looking for in an email security solution to protect all their users, from frontline workers to the C-suite? Here are 6 tips to ensure your organization has a strong email security posture.