


Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts that’ll help you defend against today’s threats.
Refine results
Topic
Products and services
Publish date
-
Microsoft Incident Response is a global team comprised of cybersecurity experts with deep, highly specialized knowledge in breach detection, response, and recovery.
-
Microsoft Purview data security mitigations for BazaCall and other human-operated data exfiltration attacks
Microsoft Defender is our toolset for prevention and mitigation of data exfiltration and ransomware attacks. -
Boost identity protection with Axiad Cloud and Microsoft Entra ID
As IT environments become more complex and multilayered to combat cybersecurity attacks, authentication processes for applications, operating systems, and workplace locations are increasingly managed in silos. -
Adopting guidance from the US National Cybersecurity Strategy to secure the Internet of Things
Microsoft is invested in helping partners create Internet of Things solutions with strong security products that support the March 2023 United States National Cybersecurity Strategy. -
How to build stronger security teams
Jayson Street of Truesec talks about security awareness training and building a foundation of cybersecurity. -
Microsoft Defender Experts for XDR helps triage, investigate, and respond to cyberthreats
Take a closer look at how Microsoft Defender Experts for XDR works, and how it complements the power of the Microsoft 365 Defender suite. -
11 best practices for securing data in cloud services
This blog explores the importance and best practices for securing data in the cloud. -
Patch me if you can: Cyberattack Series
The Microsoft Incident Response team takes swift action to help contain a ransomware attack and regain positive administrative control of the customer environment. -
How automation is evolving SecOps—and the real cost of cybercrime
ramsac Founder and Managing Director Rob May shares insights on how automation can support SecOps and how to protect against phishing attacks. -
Why endpoint management is key to securing an AI-powered future
With the coming wave of AI, this is precisely the time for organizations to prepare for the future. -
How Microsoft and Sonrai integrate to eliminate attack paths
Cloud development challenges conventional thinking about risk. -
Why a proactive detection and incident response plan is crucial for your organization
Matt Suiche of Magnet Forensics talks about top security threats for organizations and strategies for effective incident response.