Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
This post is authored by Steven Meyers, security operations principal, Microsoft Cyber Defense Operations Center. -
Tips for securing your identity against cybersecurity threats
This post is authored by Simon Pope, Principal Security Group Manager, Microsoft Security Response Center. -
Use Enterprise Threat Detection to find “invisible” cyberattacks
This post is authored by Roberto Bamberger, Principal Consultant, Enterprise Cybersecurity Group. -
4 steps to managing shadow IT
Shadow IT is on the rise. More than 80 percent of employees report using apps that weren’t sanctioned by IT. -
How to solve the diversity problem in security
I was in the midst of composing this blog on diversity in cybersecurity when a Fortune article on Women in Cybersecurity found its way to my LinkedIn feed. -
Microsoft’s Cyber Defense Operations Center shares best practices
This post is authored by a Security Principal of Cyber Security Services and Engineering Each week seems to bring a new disclosure of a cybersecurity breach somewhere in the world. -
The four necessities of modern IT security
As companies embrace the cloud and mobile computing to connect with their customers and optimize their operations, they take on new risks. -
Top Five Security Threats Facing Your Business and How to Respond
This post was authored by Ann Johnson, Vice-President, Enterprise Cybersecurity Group Headlines highlighting how vulnerable we are to cyber threats are now all too commonplace. -
Cyber Resilience: rethinking risk management
The rapid pace of technological evolution and dramatic increases in connectivity are sparking discussion about what systemic cyber risks what might look like and how best manage them. -
The Importance of Effective Information Sharing
This week, I testified before the U. -
Putting Information Sharing into Context
Putting Information Sharing into Context: New Whitepaper Offers Framework for Risk Reduction The nearly incessant drumbeat of cybersecurity incidents over the past weeks and months has brought about renewed interested in information sharing across the technical and political spheres. -
7 Precautions for Protecting Against Perpetrators
Cyberattacks and data breaches continue to dominate the news globally.