How to recover from a security breach
Actionable tips from security experts on how to prevent, mitigate, or recover from a cyberattack.
Actionable tips from security experts on how to prevent, mitigate, or recover from a cyberattack.
Learn how Microsoft evolved its culture, teams, and practices to integrate security into an agile development process that supports a cloud-based world.
In our second post about people—our most valuable resource in the SOC—we talk about our investments into readiness programs, career paths, and recruiting for success.
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 10. Detect and investigate security incidents,” you’ll learn how to set up Azure Advanced Threat Protection to uncover threats against your organization.
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 9. Protect your OS,” you’ll learn how to configure Microsoft Defender Advanced Threat Protection to prevent, detect, investigate, and respond to advanced threats.
Learn how Microsoft approaches identity management with tips you can apply to your own organization—no matter your budget.
Learn about the Microsoft APIs, services, and communities you can develop to build connected security products and services.
Instill confidence in your board with a stronger security posture. Read our latest e-book, “Understand & Improve your security posture,” to find out how.
In the second of our three-part series, we focus on the most valuable resource in the SOC—our people.
Detect a security breach in real-time and respond immediately to reduce damage. Read our latest e-book, “Defend your digital landscape,” to find out how.
The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. We are defining discrete prescriptive Windows 10 security configurations (levels 5 through 1) to meet many of the common device scenarios we see today in the enterprise.
Learn about the four cyber hygiene best practices recommended in the 24th edition of the Microsoft Security Intelligence Report (SIR) to help reduce your risk of attack.