![Audience paying attention at Microsoft Future Now event, Sydney](/en-au/business/experiences/wp-content/uploads/2022/05/experiences-banner-new.png)
Microsoft Experiences
Reimagine your digital transformation, with curated real-world experiences.
Articles for Security
![](/en-au/business/experiences/wp-content/uploads/2023/06/Digital-Defenders-800x450.png)
![](/en-au/business/experiences/wp-content/uploads/2023/06/How-we-manage-incidents-at-Microsoft-800x450.png)
How we manage incidents at Microsoft
Learn why Microsoft’s Cyber Defense Operation Center brings together incident responders, threat intelligence, legal, investigators, communications and marketing teams to work on an incident.
Read Article![](/en-au/business/experiences/wp-content/uploads/2023/06/Cybersecurity-Recovery-Remediation-After-a-Security-Breach-800x450.png)
Cybersecurity Recovery & Remediation After a Security Breach
Recovery from a cyber security incident is a three-stage process, not a continuum.
Read Article![](/en-au/business/experiences/wp-content/uploads/2023/06/Containing-and-Eradicating-Threats-800x450.png)
Containing and Eradicating Threats
Cyber-attacks are becoming more frequent and sophisticated. That’s why it’s important to plan for how you’ll contain an attack.
Read Article![](/en-au/business/experiences/wp-content/uploads/2023/06/Detecting-Analysing-Threats-800x450.png)
Detecting & Analysing Threats
The faster you act in a security incident, the faster you can resolve and remediate it. That’s why having a plan in advance is so important. We are here to help you get yours in a strong place.
Read Article![](/en-au/business/experiences/wp-content/uploads/2023/06/Cyber-Security-Incident-Response-800x450.png)
Cyber Security Incident Response
The intensity and sophistication of cyber-attacks is on the rise. It’s no longer a question of if you’ll get breached. You have been lucky if you are yet to deal with a cyber security incident.
Read Article![](/en-au/business/experiences/wp-content/uploads/2023/05/zero-trust-800x450.jpg)
The Zero Trust Security Model for Business
Learn how to utilise Microsoft solutions to protect your systems and respond to breaches quickly and effectively.
Read Article![](/en-au/business/experiences/wp-content/uploads/2023/06/what-we-learned-when-putting-it-zero-trust-at-microsoft-800x450.jpg)
What we learned when putting in Zero Trust at Microsoft
Want to find out how we’ve been implementing Zero Trust internally at Microsoft? Our experts share approaches, lessons learnt, and best practices.
Read Article![](/en-au/business/experiences/wp-content/uploads/2023/06/keep-your-computer-and-communications-secure-with-zero-trust-800x450.jpg)
Keep your computer and communications secure with Zero Trust
Without infrastructure, no IT can run. Without a network, nobody can communicate. However, these essential items are also threat vectors.
Read Article![](/en-au/business/experiences/wp-content/uploads/2023/06/zero-trust-for-app-and-data-security-with-user-productivity-800x450.jpg)
Zero Trust for app and data security, with user productivity
Assess your security posture and apply app controls and data protection for a Zero Trust based defence.
Read Article![](/en-au/business/experiences/wp-content/uploads/2023/06/with-zero-trust-you-ll-always-know-the-good-guys-from-the-bad-guys-800x450.jpg)
With the Zero Trust cyber security approach, you’ll always know the good guys from the bad guys
How to apply Zero Trust to contain the attack surface that has been expanded by remote working and device proliferation.
Read Article![](/en-au/business/experiences/wp-content/uploads/2023/05/how-zero-trust-simplicity-helps-deal-with-a-complex-world-800x450.jpg)
How Zero Trust simplicity helps deal with a complex world
Get clear and practical guidance on applying Zero Trust principles to protect against risks.
Read Article![](/en-au/business/experiences/wp-content/uploads/2023/05/managing-cyber-risk-hero-800x450.jpg)
Managing Cyber Risk
Hear from Microsoft ANZ and Industry Experts as they discuss key topics such as cyber risk identification, assessment, response, and monitoring.
Read Article![](/en-au/business/experiences/wp-content/uploads/2023/05/use-Microsoft-internal-cyberrisk-management-to-benchmark-your-organisation-800x450.jpg)
Use Microsoft’s internal cyber risk management to benchmark your own organisation
Designed for simplicity and effectiveness, learn about Microsoft’s own approach cyber risk and cybersecurity decisions.
Read Article![](/en-au/business/experiences/wp-content/uploads/2023/05/simple-steps-to-assess-and-prioritise-cyber-risks-for-your-enterprise-800x450.jpg)
Simple steps to assess and prioritise cyber risks for your enterprise
In a risk-based approach to cybersecurity, learn how much each cyber risk matters to your enterprise, so you can decide how to handle it.
Read Article![](/en-au/business/experiences/wp-content/uploads/2023/05/boost-your-cybersecurity-posture-through-cyber-risk-monitoring-800x450.jpg)
Boosting your cybersecurity posture through cost-effective, high performance cyber risk monitoring
From continuous cyber risk monitoring to multi-level, third party risk tracking and virtuous risk monitoring feedback loops, learn how to reinforce your cybersecurity.
Read Article- Selected page 1
- 1
- 2
- 3
- Next Page »