Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
In this blog, we will share how you can increase security for on-premises and hybrid infrastructure through offerings including Azure Arc, Microsoft Defender for Cloud, and Secured-core for Azure Stack HCI. -
How Microsoft can help reduce insider risk during the Great Reshuffle
These are exciting and demanding days for organizations adapting to hybrid work realities, including a wider distributed workforce and more rapid change in employee roles. -
The federal Zero Trust strategy and Microsoft’s deployment guidance for all
On January 26, 2022, the White House announced its Federal Zero Trust strategy. -
4 best practices to implement a comprehensive Zero Trust security approach
Learn how to create a comprehensive, integrated Zero Trust approach that enables simplified security and compliance across your enterprise. -
Discover 3 ways to take a holistic approach to data protection
A holistic approach to data protection can deliver better results across the organization. -
Learn about 4 approaches to comprehensive security that help leaders be fearless
The last 18 months have put pressure on organizations to speed up their digital transformation as hybrid work continues to become the new normal. -
Your guide to mobile digital forensics
Cellebrite Senior Director of Digital Intelligence Heather Mahalik offers an inside look at mobile forensics and shares how to think about the function in your organization. -
Best practices for AI security risk management
Today, we are releasing an AI security risk assessment framework as a step to empower organizations to reliably audit, track, and improve the security of the AI systems. -
Stay safe online this holiday shopping season with tips from Microsoft
You may have already noticed this holiday shopping season feels different than those we’ve had before. -
How to investigate service provider trust chains in the cloud
This blog outlines DART’s recommendations for incident responders to investigate potential abuse of these delegated admin permissions, independent of the threat actor. -
How to assess and improve the security culture of your business
Cygenta Co-Founder and Co-Chief Executive Officer Dr.