Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
DMARC security protocol helps you take control of who can send email messages on your behalf, eliminating the ability for cybercriminals to use your domain to send their illegitimate messages. -
Top 5 use cases to help you make the most of your Cloud Access Security Broker
We explore five use cases for CASBs that give you an immediate return on your investment with very little deployment effort. -
Foundations of Flow—secure and compliant automation, part 2
In part 2 of our two-part series, we go deeper into how Microsoft Flow secures your users and data, as well as enhances the IT experience. -
Beyond the buzzwords
Security vendors and professionals often use complex words and terminology to describe simple concepts. -
CISO series: Better cybersecurity requires a diverse and inclusive approach to AI and machine learning
A collaborative, inclusive approach to creating AI and machine learning models can help increase your resilience to cyberattacks. -
How to cost-effectively manage and secure a mobile ecosystem
In a world of booming mobility, Pradeo Security Mobile Threat Defense and Microsoft are partnering together for a brighter and more secure future. -
Facing the cold chills
DART recently worked with a customer who had been subject to a targeted compromise where the entity was intently and purposefully attempting to get into their systems. -
3 strategies for building an information protection program
Five years ago, we started on a journey to update and simplify information protection at Microsoft. -
5 principles driving a customer-obsessed identity strategy at Microsoft
The cloud era has fundamentally changed the way businesses must think about security and identity. -
How to recover from a security breach
Actionable tips from security experts on how to prevent, mitigate, or recover from a cyberattack. -
4 best practices to help you integrate security into DevOps
Learn how Microsoft evolved its culture, teams, and practices to integrate security into an agile development process that supports a cloud-based world. -
CISO Series: Lessons learned from the Microsoft SOC Part 2b: Career paths and readiness
In our second post about people—our most valuable resource in the SOC—we talk about our investments into readiness programs, career paths, and recruiting for success.