Skip to main content
Skip to main content
Microsoft Security
Man holding and interacting with cell phone in front of brick wall

Identity and access management

This series explores best practices for identity and access management to help you manage and protect all your users and data.

Subscribe

The importance of identity and Microsoft Azure Active Directory resilience

Read more The importance of identity and Microsoft Azure Active Directory resilience

Protect your business from password sprays with Microsoft DART recommendations

Read more Protect your business from password sprays with Microsoft DART recommendations

Microsoft’s 5 guiding principles for decentralized identities

Read more Microsoft’s 5 guiding principles for decentralized identities

3 trends shaping identity as the center of modern security

Read more 3 trends shaping identity as the center of modern security

The passwordless future is here for your Microsoft account

Read more The passwordless future is here for your Microsoft account

How user experience is shaping verifiable credentials and identity

Read more How user experience is shaping verifiable credentials and identity

How one data scientist is pioneering techniques to detect security threats

Read more How one data scientist is pioneering techniques to detect security threats

Identity at Microsoft Ignite: Strengthening Zero Trust defenses in the era of hybrid work

Read more Identity at Microsoft Ignite: Strengthening Zero Trust defenses in the era of hybrid work

Identity governance: The power of “Why not?”

Read more Identity governance: The power of “Why not?”

A breakthrough year for passwordless technology

Read more A breakthrough year for passwordless technology

Microsoft Azure Active Directory again a “Leader” in Gartner Magic Quadrant for Access Management

Read more Microsoft Azure Active Directory again a “Leader” in Gartner Magic Quadrant for Access Management

Announcing the Zero Trust Deployment Center

Read more Announcing the Zero Trust Deployment Center