Register for the October 30th web seminar featuring Microsoft Digital Defense Report 2024 insights.
Cyber Resilience
Meet the experts
Putting cyber threat intelligence into geopolitical context
Threat intelligence expert Fanta Orr explains how threat intelligence analysis uncovers the “why” behind cyberthreat activity and helps better protect customers who might be vulnerable targets.
Practical cyber defense
Learn the ABCs of Threat Hunting
Explore the ABCs of Threat Hunting Guide to get tips on how to hunt, identify, and mitigate cyberthreats to help become more cyber-resilient.
Emerging threats
Protecting yourself from holiday-season DDoS attacks
See what drives criminals to increase DDoS activity during the holidays and learn what you can do to help protect your organization
Meet the experts
Threat Intelligence, Head of IoT/OT Security Research David Atch
In our latest expert profile, we spoke with David Atch, the Head of IoT/OT Security Research at Microsoft, to talk about the growing security risks of IoT and OT connectivity.
Intelligence reports
The convergence of IT and OT
Prevent 98% of cyberattacks against IoT and OT devices. Learn how cybersecurity hygiene can be used to protect against ransomware and cyber extortion.
Emerging threats
Propaganda in the digital age: How cyber influence operations erode trust
Cyber influence operations are a prevalent tactic being used in the world of cybercrime to erode trust in the digital age.
Meet the experts
Discover how cybercriminals use tactics like social engineering to perpetrate attacks
Matt Lundy of the Microsoft Digital Crimes Unit (DCU) describes how the experts of the Identity and Platform Enforcement team help keep customers safe from threats like ransomware, business email compromise, and homoglyph domains.
Supply chain
CISO Insider: Issue 2
Navigate today’s threat landscape with perspectives from CISOs, exclusive analysis, and recommendations from security leaders.
Intelligence reports
Extortion economics
Ransomware, one of the most persistent and pervasive cyber threats, continues to evolve. Here is an in-depth look at ransomware as a service (Raas), the latest tool of cybercrime.
Practical cyber defense
Three ways to protect yourself from ransomware
Modern ransomware defense requires a lot more than just setting up detection measures. Discover three ways you can harden your network’s security against ransomware
Meet the experts
Behind the scenes with cybercrime and counter ransomware expert Nick Carr
Nick Carr, Cybercrime Intelligence Team Lead at the Microsoft Threat Intelligence Center, discusses ransomware trends, explains what Microsoft is doing to protect customers from ransomware, and describes what organizations can do if they’ve been affected by it.
Intelligence Reports
Defending Ukraine: Early Lessons from the Cyber War
How cyber-attacks and cyber influence operations are being used in the war between Russian and the Ukraine.
Emerging threats
Protect your organization from ransomware
Guidance for protecting your organization against ransomware.
Emerging threats
Ransomware-as-a-service: The new face of industrialized cybercrime
Discover how to protect your organization from Ransomware-as-a-service (RaaS), a tactic that is gaining serious traction in the world of cybercrime.
Meet the experts
Expert Profile: Steve Ginty Behind the scenes with Microsoft’s threat intelligence expert
Steve Ginty, director of cyber intelligence at Microsoft, talks about the importance of knowing your external attack surface, provides tips on effective security readiness, and identifies the most important step you can take to protect yourself against threat actors online.
Intelligence Reports
Special Report: Ukraine
Russian threat actors have launched increasingly disruptive and visible cyberattacks against Ukraine and have included activities such as phishing, reconnaissance, and attempts to compromise public information sources.
Emerging threats
Anatomy of an external attack surface
Learn about threats to organizations’ external attack surface and how to help stay protected with Zero Trust.
Practical cyber defense
Using cybersecurity to help manage volatility in the global threat landscape
Protect against 98% of cyberattacks with cybersecurity hygiene. Get guidance to help make your organization more cyber resilient.
Practical. cyber defense
CISO Insider: Issue 1
Navigate today’s threat landscape with perspectives from CISOs, exclusive analysis, and recommendations from security leaders.
Intelligence reports
Cyber Resilience Report
Learn five fundamental steps to enhance your organizations cyber resilience and help protect against ransomware and other malicious cyberattacks.
Get started
Join Microsoft events
Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
Talk to us
Follow Microsoft Security