Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
The Department of Defense released its formal Zero Trust strategy, marking a major milestone in its goal of achieving enterprise-wide implementation by 2027. -
Microsoft Security tips for mitigating risk in mergers and acquisitions
Mergers and acquisitions can be challenging. -
Discover Microsoft Security solutions for SLTT government grant readiness
Products and solutions from Microsoft can help state, local, and territorial governments improve their cybersecurity and secure federal grant funding. -
How to prevent lateral movement attacks using Microsoft 365 Defender
Learn how Microsoft 365 Defender can enhance mitigations against lateral movement paths in your environment, stopping attackers from gaining access to privileged and sensitive accounts. -
Cybersecurity awareness tips from Microsoft to empower your team to #BeCyberSmart
Cybersecurity Awareness Month is here. Get the #BeCybersmart education kit and learn how you can help your employees become cyber defenders. -
How one product manager builds community at Microsoft Security
In this interview, Principal Product Manager Joey Cruz explains how his military experience inspires his work protecting customers in identity and access management at Microsoft. -
CSO perspective: Why a strong IAM strategy is key to an organization’s cybersecurity approach
Mastercard Deputy Chief Security Officer Alissa “Dr. -
The art and science behind Microsoft threat hunting: Part 2
In this follow-up post in our series about threat hunting, we talk about some general hunting strategies, frameworks, tools, and how Microsoft incident responders work with threat intelligence. -
The art and science behind Microsoft threat hunting: Part 1
At Microsoft, we define threat hunting as the practice of actively looking for cyberthreats that have covertly (or not so covertly) penetrated an environment. -
Data governance: 5 tips for holistic data protection
Proactive data governance offers a holistic approach that conserves resources and simplifies the protection of your data assets. -
How IT and security teams can work together to improve endpoint security
The threat landscape has changed over the last few years. -
Industrial systems: What it takes to secure and staff them
Chief Executive Officer and owner of Ampere Industrial Security Patrick C.