Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
This blog explores the importance and best practices for securing data in the cloud. -
Patch me if you can: Cyberattack Series
The Microsoft Incident Response team takes swift action to help contain a ransomware attack and regain positive administrative control of the customer environment. -
How automation is evolving SecOps—and the real cost of cybercrime
ramsac Founder and Managing Director Rob May shares insights on how automation can support SecOps and how to protect against phishing attacks. -
Why endpoint management is key to securing an AI-powered future
With the coming wave of AI, this is precisely the time for organizations to prepare for the future. -
How Microsoft and Sonrai integrate to eliminate attack paths
Cloud development challenges conventional thinking about risk. -
Why a proactive detection and incident response plan is crucial for your organization
Matt Suiche of Magnet Forensics talks about top security threats for organizations and strategies for effective incident response. -
How Microsoft can help you go passwordless this World Password Day
Learn how guessing, replay, phishing, and multifactor authentication fatigue attacks demonstrate the ongoing vulnerability of passwords, and why going passwordless makes your organization more secure while improving user experience. -
Why you should practice rollbacks to prevent data loss in a ransomware attack
Tanya Janca, Founder and Chief Executive Officer of We Hack Purple, shares insights on application security and offers strategies to protect against data loss from ransomware attacks. -
Healthy security habits to fight credential breaches: Cyberattack Series
This is the second in an ongoing series exploring some of the most notable cases of the Microsoft Incident Response Team. -
Stay compliant and protect sensitive data with Zero Trust security
Learn how to secure data and identities and meet compliance requirements with a comprehensive Zero Trust approach. -
Simplified endpoint management with Microsoft Intune Suite: Adopting a long-term approach with intelligence and automation
Do you feel like your endpoint management set-up is too complex? This step-by-step guide will help you create a vision and set you on the path to simpler endpoint management. -
Protect intellectual property with Govern 365 and Microsoft Purview
Learn how to secure sensitive information within your global supply chain with Netwoven Govern 365 and Microsoft Purview Information Protection.