Microsoft Security Experts
Our expertise is now your expertise. Learn how to extend your ability to defend and manage with a new line of services from the experts at Microsoft.
Refine results
Topic
Products and services
Publish date
-
A probabilistic graphical modeling framework used by Microsoft 365 Defender research and intelligence teams for threat actor tracking enables us to quickly predict the likely threat group responsible for an attack, as well as the likely next attack stages. -
Modernizing your network security strategy
From the global pandemic to recent cyberattacks, our world has faced many challenges during the past 12 months. -
Lessons learned from the Microsoft SOC—Part 3d: Zen and the art of threat hunting
This blog provides lessons learned on how Microsoft hunts for threats in our IT environment and how you can apply these lessons to building or improving your threat hunting program. -
Microsoft Threat Protection leads in real-world detection in MITRE ATT&CK evaluation
The latest round of MITRE ATT&CK evaluations proved yet again that Microsoft customers can trust they are fully protected even in the face of such an advanced attack as APT29. -
Threat hunting: Part 1—Why your SOC needs a proactive hunting team
A threat hunting team can help you defend against stealth attackers. -
Experts on demand: Your direct line to Microsoft security insight, guidance, and expertise
Experts on demand is now generally available and gives customers direct access to real-life Microsoft threat analysts to help with their security investigations. -
Gartner names Microsoft a Leader in 2019 Endpoint Protection Platforms Magic Quadrant
Gartner named Microsoft a Leader in the 2019 Gartner Magic Quadrant for Endpoint Protection Platforms, positioned highest in execution. -
Announcing Microsoft Defender ATP for Mac and new Threat and Vulnerability Management capabilities
Today at Ignite Amsterdam, we’re excited to announce two additions to our endpoint security platform. -
Helping security professionals do more, better
Learn how Microsoft’s latest security product releases and solutions showcased at RSA are helping security professionals do more, better. -
Tips for protecting your information and privacy against cybersecurity threats
This post is authored by Steven Meyers, security operations principal, Microsoft Cyber Defense Operations Center. -
Singapore: Realizing that for the future to be smart, it needs to be secure
In 2005, just over a decade ago, the majority of large internet user populations, certainly as a percentage of their total national population, were still to be found in North America and Europe. -
The two-pronged approach to detecting persistent adversaries
Advanced Persistent Threats use two primary methods of persistence: compromised endpoints and compromised credentials.