Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
DART recently worked with a customer who had been subject to a targeted compromise where the entity was intently and purposefully attempting to get into their systems. -
3 strategies for building an information protection program
Five years ago, we started on a journey to update and simplify information protection at Microsoft. -
5 principles driving a customer-obsessed identity strategy at Microsoft
The cloud era has fundamentally changed the way businesses must think about security and identity. -
How to recover from a security breach
Actionable tips from security experts on how to prevent, mitigate, or recover from a cyberattack. -
4 best practices to help you integrate security into DevOps
Learn how Microsoft evolved its culture, teams, and practices to integrate security into an agile development process that supports a cloud-based world. -
CISO Series: Lessons learned from the Microsoft SOC Part 2b: Career paths and readiness
In our second post about people—our most valuable resource in the SOC—we talk about our investments into readiness programs, career paths, and recruiting for success. -
Step 10. Detect and investigate security incidents: top 10 actions to secure your environment
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. -
Step 9. Protect your OS: top 10 actions to secure your environment
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. -
3 investments Microsoft is making to improve identity management
Learn how Microsoft approaches identity management with tips you can apply to your own organization—no matter your budget. -
Developing connected security solutions
Learn about the Microsoft APIs, services, and communities you can develop to build connected security products and services. -
Understand and improve your security posture with Microsoft 365
Instill confidence in your board with a stronger security posture. -
CISO Series: Lessons learned from the Microsoft SOC—Part 2a: Organizing people
In the second of our three-part series, we focus on the most valuable resource in the SOC—our people.