Trace Id is missing

Devices and Infrastructure

A person standing in front of a white arrow
Meet the experts

Expert profile: Justin Turner

Principal Group Manager Justin Turner, Microsoft Security Research describes the three enduring challenges he’s seen throughout his cybersecurity career: configuration management, patching, and device visibility.
A person with curly hair wearing glasses
Meet the experts

Industry expert weighs in on security in manufacturing

Industry expert Myrna Soto breaks down the state of cybersecurity across manufacturing, discussing the sector’s emerging risks and opportunities, future legislative developments, and best practices to help strengthen defenses.
Intelligence reports

Microsoft Digital Defense Report 2022

In the 2022 edition of the Microsoft Digital Defense Report, Microsoft security experts illuminate today’s threat landscape, providing insights on emerging trends as well as historically persistent threats in the 2022 Microsoft Digital Defense Report.
A computer screen with icons and a phone
Emerging threats

The unique security risk of IoT/OT devices

Protect your IoT/OT devices by decreasing network vulnerabilities and defending against cyber threats such as ransomware and threat actors.
A person in a black shirt smiling
Meet the experts

Threat Intelligence, Head of IoT/OT Security Research David Atch

In our latest expert profile, we spoke with David Atch, the Head of IoT/OT Security Research at Microsoft, to talk about the growing security risks of IoT and OT connectivity.
A computer network with icons
Intelligence reports

The convergence of IT and OT

Prevent 98% of cyberattacks against IoT and OT devices. Learn how cybersecurity hygiene can be used to protect against ransomware and cyber extortion.
A person in a suit and tie
Meet the experts

Discover how cybercriminals use tactics like social engineering to perpetrate attacks

Matt Lundy of the Microsoft Digital Crimes Unit (DCU) describes how the experts of the Identity and Platform Enforcement team help keep customers safe from threats like ransomware, business email compromise, and homoglyph domains.
A person holding a tablet
Practical cyber defense

CISO Insider: Issue 2

Navigate today’s threat landscape with perspectives from CISOs, exclusive analysis, and recommendations from security leaders.
Blue and red circles with a watch on a light gray background.
Emerging threats

Cyberthreat Minute: The scale and scope of worldwide cybercrime in 60 seconds

Within a 60-second window cybercrime can consist of password, attacks, DDoS attacks, ransomware, IoT attacks and phishing leading to lost revenue.
A close-up of a couple of women
Practical cyber defense 

Three ways to protect yourself from ransomware

Modern ransomware defense requires a lot more than just setting up detection measures. Discover three ways you can harden your network’s security against ransomware.
A person smiling in front of a red and white background
Meet the experts

Expert Profile: Steve Ginty Behind the scenes with Microsoft’s threat intelligence expert

Cyberthreat intelligence expert, Steve Ginty, gives tips on steps you can take against threat actors and maintain cybersecurity readiness.
A person holding a computer in a warehouse
Practical cyber defense

CISO Insider:  Issue 1

Navigate today’s threat landscape with perspectives from CISOs, exclusive analysis, and recommendations from security leaders.
A blue background with white,red circle and white arrows
Intelligence reports

Cyber Resilience

Learn five fundamental steps to enhance your organizations cyber resilience and help protect against ransomware and other malicious cyberattacks.
Abstract graphic of concentric circles in green, yellow, and white on a gray background.
Woman reading a book on a leather sofa in a cozy living room setting.
Get started

Join Microsoft events

Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
A woman reading from a tablet while standing outside a building.
Talk to us

Join Microsoft’s tech community

Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.

Follow Microsoft