


Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts that’ll help you defend against today’s threats.
Refine results
Topic
Products and services
Publish date
-
Find out how a cyberattack by Storm-2077 was halted faster because the Microsoft Incident Response team is both proactive and reactive at the same time.
-
3 priorities for adopting proactive identity and access security in 2025
Adopting proactive defensive measures is the only way to get ahead of determined efforts to compromise identities and gain access to your environment. -
Fast-track generative AI security with Microsoft Purview
Read how Microsoft Purview can secure and govern generative AI quickly, with minimal user impact, deployment resources, and change management. -
Why security teams rely on Microsoft Defender Experts for XDR for managed detection and response
Microsoft Defender Experts for XDR is a mature and proven service that triages, investigates, and responds to incidents and hunts for threats on a customer’s behalf around the clock. -
Convincing a billion users to love passkeys: UX design insights from Microsoft to boost adoption and security
Passkeys offer faster, safer sign-ins than passwords. -
Why security leaders trust Microsoft Sentinel to modernize their SOC
Microsoft Sentinel transforms security operations centers with cloud-native SIEM capabilities, AI-powered threat detection, and cost-effective scalability to protect your entire digital ecosystem. -
How Microsoft Defender for Office 365 innovated to address QR code phishing attacks
This blog examines the impact of QR code phishing campaigns and the innovative features of Microsoft Defender for Office 365 that help combat evolving cyberthreats. -
Microsoft’s guidance to help mitigate Kerberoasting
Kerberoasting, a well-known Active Directory (AD) attack vector, enables threat actors to steal credentials and navigate through devices and networks. -
Cybersecurity Awareness Month: Securing our world—together
To help our global cyberdefenders, Microsoft has put together the Be Cybersmart Kit, designed to educate everyone, on best practices for going passwordless, not falling for sophisticated phishing or fraud, device protection, AI safety, and more. -
How comprehensive security simplifies the defense of your digital estate
End-to-end security is a modern, comprehensive approach to data protection that aligns data protection and incident response across devices, systems, and users. -
The art and science behind Microsoft threat hunting: Part 3
In this blog post, read how Microsoft Incident Response leverages three types of threat intelligence to enhance incident response scenarios. -
How Microsoft Entra ID supports US government agencies in meeting identity security requirements
United States Government agencies are adopting Microsoft Entra ID to consolidate siloed identity solutions, reduce operational complexity, and improve control and visibility across all users.