Trace Id is missing
A man and woman sitting in front of a glass shelf.
AI

Defending against SIM swapping, AI-driven social engineering

In an interview at Black Hat 2024, Sherrod DeGrippo discusses the latest threat trends including AI’s role in accelerating cybercrime tactics and tips to help organizations be more resilient.
A group of people posing for a photo
Online fraud

Meet the experts tracking Storm-0539 gift card fraud

Summary: With backgrounds spanning international relations, federal law enforcement, security, and government, Microsoft Threat Intelligence analysts Alison Ali, Waymon Ho, and Emiel Haeghebaert offer a range of unique skills for tracking Storm-0539, a threat actor specializing in payment card theft and gift card fraud.
A girl with long hair
AI

Expert Profile: Homa Hayatyfar

Principal Data and Applied Science Manager Homa Hayatyfar describes the use of machine learning models to reinforce defenses, just one of many ways AI is changing the face of security.
A person standing in front of a computer screen
Nation state

On the frontlines: Decoding Chinese threat actor tactics and techniques

Microsoft Threat Intelligence China experts Sarah Jones and Judy Ng join Microsoft Threat Intelligence Strategy director Sherrod DeGrippo to discuss the geopolitical landscape while providing advice and insight on modern cybersecurity careers.
A person with curly hair wearing glasses
Supply chain

Industry expert weighs in on security in manufacturing

Industry expert Myrna Soto breaks down the state of cybersecurity across manufacturing, discussing the sector’s emerging risks and opportunities, future legislative developments, and best practices to help strengthen defenses.
A person smiling for a picture
Nation state

Putting cyber threat intelligence into geopolitical context

Threat intelligence expert Fanta Orr explains how threat intelligence analysis uncovers the “why” behind cyberthreat activity and helps better protect customers who might be vulnerable targets.
A person standing in front of a white arrow
Threat actor

Expert profile: Justin Turner

Principal Group Manager Justin Turner, Microsoft Security Research describes the three enduring challenges he’s seen throughout his cybersecurity career: configuration management, patching, and device visibility.
A person with a mustache standing in front of white arrow
Multifactor authentication

Expert Profile: Dustin Duran

Threat intelligence expert Dustin Duran explains how his team adopts a threat actor mindset to better understand their adversaries and help keep customer organizations and security centers safe.
A person in a suit
Threat actor

Insights from Iranian threat actor expert Simeon Kakpovi

Senior threat intelligence analyst Simeon Kakpovi talks about training the next generation of cyber defenders and overcoming the sheer tenacity of Iranian threat actors.
A person in a black shirt
IoT/OT

Threat Intelligence, Head of IoT/OT Security Research David Atch

In our latest expert profile, we spoke with David Atch, the Head of IoT/OT Security Research at Microsoft, to talk about the growing security risks of IoT and OT connectivity.
A person in a suit and tie
Social engineering

Discover how cybercriminals use tactics like social engineering to perpetrate attacks

Matt Lundy of the Microsoft Digital Crimes Unit (DCU) describes how the experts of the Identity and Platform Enforcement team help keep customers safe from threats like ransomware, business email compromise, and homoglyph domains.
A girl in a black shirt
Ransomware

Threat intelligence expert Emily Hacker

Threat Intelligence Analyst Emily Hacker discusses how her team stays on top of the changing ransomware as a service landscape and the measures they take to help catch pre-ransomware actors.
A person smiling at the camera
Ransomware

Behind the scenes with cybercrime and counter ransomware expert Nick Carr

Nick Carr, Cybercrime Intelligence Team Lead at the Microsoft Threat Intelligence Center, discusses ransomware trends, explains what Microsoft is doing to protect customers from ransomware, and describes what organizations can do if they’ve been affected by it.
A person smiling in front of a red and white background
Threat actor

Expert Profile: Steve Ginty Behind the scenes with Microsoft’s threat intelligence expert

Steve Ginty, director of cyber intelligence at Microsoft, talks about the importance of knowing your external attack surface, provides tips on effective security readiness, and identifies the most important step you can take to protect yourself against threat actors online.
A person wearing glasses and a striped shirt
Multifactor authentication

Expert analysis from inside the Microsoft Security Response Center (MSRC)

Spend a moment behind the scenes with the MSRC’s Russ McRee, who shares his thoughts on the state of modern security.
A person in a suit
Identity

Christopher Glyer: Principal Threat Intelligence Lead, MSTIC

As Principal Threat Intelligence Lead with a focus on ransomware at the Microsoft Threat Intelligence Center (MSTIC), Christopher Glyer is part of the team that investigates how the most advanced threat actors access and exploit systems.
Abstract graphic of concentric circles in green, yellow, and white on a gray background.
Woman reading a book on a leather sofa in a cozy living room setting.
Get started

Join Microsoft events

Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
A woman reading from a tablet while standing outside a building.
Talk to us

Join Microsoft’s tech community

Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.

Follow Microsoft Security