Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
This blog examines the impact of QR code phishing campaigns and the innovative features of Microsoft Defender for Office 365 that help combat evolving cyberthreats. -
Microsoft’s guidance to help mitigate Kerberoasting
Kerberoasting, a well-known Active Directory (AD) attack vector, enables threat actors to steal credentials and navigate through devices and networks. -
Cybersecurity Awareness Month: Securing our world—together
To help our global cyberdefenders, Microsoft has put together the Be Cybersmart Kit, designed to educate everyone, on best practices for going passwordless, not falling for sophisticated phishing or fraud, device protection, AI safety, and more. -
How comprehensive security simplifies the defense of your digital estate
End-to-end security is a modern, comprehensive approach to data protection that aligns data protection and incident response across devices, systems, and users. -
The art and science behind Microsoft threat hunting: Part 3
In this blog post, read how Microsoft Incident Response leverages three types of threat intelligence to enhance incident response scenarios. -
How Microsoft Entra ID supports US government agencies in meeting identity security requirements
United States Government agencies are adopting Microsoft Entra ID to consolidate siloed identity solutions, reduce operational complexity, and improve control and visibility across all users. -
New Microsoft whitepaper shares how to prepare your data for secure AI adoption
In our newly released whitepaper, we share strategies to prepare for the top data challenges and new data security needs in the age of AI. -
Working with a cybersecurity committee of the board
Learn about the rise of cybersecurity committees and how the CISO and IT security team can work with them to produce the best result for the organization’s IT security and enable digital transformation. -
How to boost your incident response readiness
Discover key steps to bolster incident response readiness, from disaster recovery plans to secure deployments, guided by insights from the Microsoft Incident Response team. -
Microsoft Incident Response tips for managing a mass password reset
When an active incident leaves systems vulnerable, a mass password reset may be the right tool to restore security. -
How to achieve cloud-native endpoint management with Microsoft Intune
In this post, we’re focusing on what it really takes for organizations to become fully cloud-native in endpoint management—from the strategic leadership to the tactical execution. -
The four stages of creating a trust fabric with identity and network security
The trust fabric journey has four stages of maturity for organizations working to evaluate, improve, and evolve their identity and network access security posture.