Inside Track Library
-
Start reducing your organization’s Shadow IT risk in 3 steps
http://approjects.co.za/?big=insidetrack/blog/start-reducing-your ...Learn three steps to reduce Shadow IT security risks, including how to set up the right team, create a reporting system, ...
-
Empowering employee self-service with guardrails: How we’re using ...
http://approjects.co.za/?big=insidetrack/blog/empowering-employee ...Check out how we’re using sensitivity labels across our Microsoft 365 productivity suite to enable self-service for our employees ...
-
Transforming Microsoft’s enterprise network with next-generation ...
http://approjects.co.za/?big=insidetrack/blog/transforming-microsofts ...Identity-focused security models, software-defined infrastructure, and network-as-code allow Microsoft to provide its employees ...
-
Lessons learned at Microsoft: Five steps you can take to reduce ...
http://approjects.co.za/?big=insidetrack/blog/lessons-learned-at ...Check out the five key principles that we use to reduce our ransomware risk internally here at Microsoft.
-
Sharing what we learned deploying our secure federal environment
http://approjects.co.za/?big=insidetrack/blog/sharing-what-we-learned ...Learn how we deployed the same highly secure environment our Microsoft Federal organization built for sovereign customers ...
-
New approach to IoT device integration enables employee experience ...
http://approjects.co.za/?big=insidetrack/blog/new-approach-to-iot ...Thousands of sensors build employee experiences in Microsoft buildings. IoT device integration across Microsoft’s expanding ...
-
Protecting against oversharing Power BI reports with Microsoft ...
http://approjects.co.za/?big=insidetrack/blog/protecting-against ...Learn how we use Microsoft Sentinel security information and our SIEM event management solution to limit accidental oversharing ...
-
Doing more with less: Optimizing shadow IT through Microsoft ...
http://approjects.co.za/?big=insidetrack/blog/doing-more-with-less ...Check out our best practices for cutting Microsoft Azure spend on shadow IT.
-
Microsoft CISO Bret Arsenault provides practical advice to secure ...
http://approjects.co.za/?big=insidetrack/blog/microsoft-ciso-bret ...Microsoft CISO Bret Arsenault shares cybersecurity perspectives and advice from his industry peers in new podcast series ...
-
Boosting Microsoft’s response to cybersecurity attacks with Microsoft ...
http://approjects.co.za/?big=insidetrack/blog/boosting-microsofts ...Microsoft’s internal security team is using Microsoft Sentinel and its AI and cloud capabilities to respond to suspicious ...
-
Empowering employees after the call: Enabling and securing Microsoft ...
http://approjects.co.za/?big=insidetrack/blog/empowering-employees ...Microsoft Teams meeting data retention policies ensure our employees safely get the benefits of meeting recordings, transcriptions, ...
-
Why Microsoft uses a playbook to guard against ransomware
http://approjects.co.za/?big=insidetrack/blog/why-microsoft-uses ...Central to the Ransomware Elimination Program (REP) at Microsoft is a new playbook, aligning teams to deter and respond to ...
-
Moving to next-generation SIEM at Microsoft with Microsoft Sentinel
http://approjects.co.za/?big=insidetrack/blog/moving-to-next-generation ...Learn how Microsoft is transforming its approach to SIEM with Microsoft Sentinel.
-
Sharing how Microsoft protects against ransomware
http://approjects.co.za/?big=insidetrack/blog/sharing-how-microsoft ...With cyberthreats becoming more severe every day, Microsoft’s Ransomware Elimination Program empowers the company to protect ...
-
Learning from engineering Zero Trust networking at Microsoft
http://approjects.co.za/?big=insidetrack/blog/lessons-learned-in ...Check out how Microsoft is implementing Zero Trust networking to support its Zero Trust initiative.
-
Sharing Microsoft's Zero Trust networking lessons for leaders
http://approjects.co.za/?big=insidetrack/blog/zero-trust-networking ...Discover how Microsoft is implementing Zero Trust networking in support of its Zero Trust initiative.
-
Managing user identities and secure access at Microsoft
http://approjects.co.za/?big=insidetrack/blog/managing-user-identities ...Learn how Microsoft uses a combination of tools and processes to manage identities and network access for its employees, ...
-
Azure resource inventory helps manage operational efficiency ...
http://approjects.co.za/?big=insidetrack/blog/azure-resource-inventory ...For Microsoft Digital, conventional processes for managing Microsoft Azure resources weren’t providing good visibility into ...
-
Implementing a Zero Trust security model at Microsoft
http://approjects.co.za/?big=insidetrack/blog/implementing-a-zero ...Learn how Microsoft is implementing a Zero Trust security model internally at Microsoft.
-
Evolving the device experience at Microsoft
http://approjects.co.za/?big=insidetrack/blog/evolving-the-device ...Learn how Microsoft is migrating its employee devices from a traditional management model to one that works well with modern ...
-
Enabling remote work at Microsoft
http://approjects.co.za/?big=en-us/insidetrack/enabling-remote-work ...Over the last few years, Microsoft Digital has transformed Microsoft’s technical infrastructure and workplace culture, enabling ...
-
Transitioning to modern access architecture with Zero Trust
http://approjects.co.za/?big=en-us/insidetrack/transitioning-to ...The shift to a more mobile, cloud-connected workforce introduced new and continuously evolving security threats. All these ...
-
Culture, the cloud, and security: learning from Microsoft’s digital ...
http://approjects.co.za/?big=en-us/insidetrack/blog/culture-the ...Discover what's changed internally in our IT organization here at Microsoft since CEO Satya Nadella’s 2017 memo calling for ...
-
Implementing strong user authentication with Windows Hello for ...
http://approjects.co.za/?big=insidetrack/blog/implementing-strong ...Look back at how we implemented Windows Hello for Business internally at Microsoft.
-
Transforming data governance at Microsoft with Microsoft Purview ...
http://approjects.co.za/?big=insidetrack/blog/transforming-data ...Learn how we’re transforming data governance at Microsoft with Microsoft Purview and Microsoft Fabric.
-
Improving security by protecting elevated-privilege accounts ...
http://approjects.co.za/?big=insidetrack/blog/improving-security ...Learn how Microsoft is protecting its environment and its system administrators.
-
Building an anti-ransomware program at Microsoft focused on an ...
http://approjects.co.za/?big=insidetrack/blog/building-an-anti-ransomware ...To guard against attack, Microsoft works toward the Optimal Ransomware Resiliency State—a series of standards, practices, ...
-
Finding and remediating rogue access points on the Microsoft ...
http://approjects.co.za/?big=insidetrack/blog/finding-rogue-access ...Corporate networks may host hundreds of “rogue” devices that threaten security. Microsoft devised ways for finding rogue ...
-
Microsoft helps employees work securely from home using a Zero ...
http://approjects.co.za/?big=insidetrack/blog/microsoft-helps-employees ...Microsoft is taking a Zero Trust approach to keeping its employees safe as they work from home.
-
Sharing how Microsoft now secures its network with a Zero Trust ...
http://approjects.co.za/?big=insidetrack/blog/zero-trust-networking ...Safeguarding corporate resources is a high priority for any business, but how does Microsoft protect a network perimeter ...
-
Using a Zero Trust strategy to secure Microsoft’s network during ...
http://approjects.co.za/?big=insidetrack/blog/using-a-zero-trust ...Microsoft adopted a split-tunneled configuration for its VPN platform, which allows employees to quickly access resources ...
-
Microsoft’s digital security team answers your Top 10 questions ...
http://approjects.co.za/?big=insidetrack/blog/microsofts-digital ...Microsoft's internal digital security team answers common questions about securing an enterprise using a Zero Trust security ...
-
Shining a light on how Microsoft manages Shadow IT
http://approjects.co.za/?big=insidetrack/blog/shining-a-light-on ...Learn how Microsoft is reducing its security risk by addressing Shadow IT and moving toward enterprise-wide compliance standards.
-
Providing modern data transfer and storage service at Microsoft ...
http://approjects.co.za/?big=insidetrack/blog/microsoft-uses-azure ...Learn how Microsoft retooled the way it transfers large files in and out of the company.
-
Using shielded virtual machines to help protect high-value assets
http://approjects.co.za/?big=insidetrack/blog/using-shielded-virtual ...Learn how Microsoft created secure, isolated environments for business groups that manage highly confidential, regulated, ...
-
Verifying identity in a Zero Trust model internally at Microsoft
http://approjects.co.za/?big=insidetrack/blog/verifying-identity ...Learn how Microsoft is verifying identity across the environment to support a Zero Trust security model.
-
Verifying device health at Microsoft with Zero Trust
http://approjects.co.za/?big=insidetrack/blog/verifying-device-health ...Learn how Microsoft’s Zero Trust model helps the company verify device health across all devices that access its resources.
-
Watch Microsoft's CISO series on eliminating passwords
http://approjects.co.za/?big=en-us/insidetrack/blog/watch-microsofts ...Learn from our CISO here at Microsoft how eliminating passwords improves your security and gives your employees a better ...
-
http://approjects.co.za/?big=en-us/insidetrack/security?OCID=InsideTrack_Search
At Microsoft, our identity-driven security solutions protect users, devices, and data from potential vulnerabilities at every ...
-
Creating security controls for IoT devices at Microsoft
http://approjects.co.za/?big=insidetrack/blog/creating-security ...Learn how we’re addressing the unique challenges of securely managing Internet of Things devices by performing comprehensive ...
-
How Microsoft is transforming the way it fights security threats
http://approjects.co.za/?big=insidetrack/blog/how-microsoft-is-transforming ...Microsoft’s security team recounts their challenges, lessons, and proven practices at RSA 2020.
-
How Microsoft is transforming its approach to security training
http://approjects.co.za/?big=insidetrack/blog/how-microsoft-is-transforming ...Microsoft's Security Education and Awareness team is taking a different approach to security training by moving away from ...
Can't find what you're looking for?
Search tips
Make sure all words are spelled correctly, and then try different keywords or refine results by using the filter on the left side of this page.