Audience paying attention at Microsoft Future Now event, Sydney

Microsoft Experiences

Reimagine your digital transformation, with curated real-world experiences.

Articles for Security

Security Industry

Digital Defenders

Let’s talk next gen Cyber Defence.

Read Article
Security Industry

How we manage incidents at Microsoft

Learn why Microsoft’s Cyber Defense Operation Center brings together incident responders, threat intelligence, legal, investigators, communications and marketing teams to work on an incident.

Read Article
Security Industry

Cybersecurity Recovery & Remediation After a Security Breach

Recovery from a cyber security incident is a three-stage process, not a continuum.

Read Article
Security Industry

Containing and Eradicating Threats

Cyber-attacks are becoming more frequent and sophisticated. That’s why it’s important to plan for how you’ll contain an attack.

Read Article
Security Industry

Detecting & Analysing Threats

The faster you act in a security incident, the faster you can resolve and remediate it. That’s why having a plan in advance is so important. We are here to help you get yours in a strong place.

Read Article
Security Industry

Cyber Security Incident Response

The intensity and sophistication of cyber-attacks is on the rise. It’s no longer a question of if you’ll get breached. You have been lucky if you are yet to deal with a cyber security incident.

Read Article
Security Industry

The Zero Trust Security Model for Business

Learn how to utilise Microsoft solutions to protect your systems and respond to breaches quickly and effectively.

Read Article
Security Industry

What we learned when putting in Zero Trust at Microsoft

Want to find out how we’ve been implementing Zero Trust internally at Microsoft? Our experts share approaches, lessons learnt, and best practices.

Read Article
Security Industry

Keep your computer and communications secure with Zero Trust

Without infrastructure, no IT can run. Without a network, nobody can communicate. However, these essential items are also threat vectors.

Read Article
Security Industry

Zero Trust for app and data security, with user productivity

Assess your security posture and apply app controls and data protection for a Zero Trust based defence.

Read Article
Security Industry

With the Zero Trust cyber security approach, you’ll always know the good guys from the bad guys

How to apply Zero Trust to contain the attack surface that has been expanded by remote working and device proliferation.

Read Article
Security Industry

How Zero Trust simplicity helps deal with a complex world

Get clear and practical guidance on applying Zero Trust principles to protect against risks.

Read Article
Security Industry

Managing Cyber Risk

Hear from Microsoft ANZ and Industry Experts as they discuss key topics such as cyber risk identification, assessment, response, and monitoring.

Read Article
Security Industry

Use Microsoft’s internal cyber risk management to benchmark your own organisation

Designed for simplicity and effectiveness, learn about Microsoft’s own approach cyber risk and cybersecurity decisions.

Read Article
Security Industry

Simple steps to assess and prioritise cyber risks for your enterprise

In a risk-based approach to cybersecurity, learn how much each cyber risk matters to your enterprise, so you can decide how to handle it.

Read Article
Security Industry

Boosting your cybersecurity posture through cost-effective, high performance cyber risk monitoring

From continuous cyber risk monitoring to multi-level, third party risk tracking and virtuous risk monitoring feedback loops, learn how to reinforce your cybersecurity.

Read Article