Register now to watch the on-demand web seminar featuring Microsoft Digital Defense Report 2024 insights.
Cyber Signals
Intelligence reports
Navigating cyberthreats and strengthening defenses in the era of AI
Advances in artificial intelligence (AI) present new threats—and opportunities—for cybersecurity. Discover how threat actors use AI to conduct more sophisticated attacks, then review the best practices that help protect against traditional and AI-enabled cyberthreats.
Intelligence reports
Cyberthreats increasingly target the world’s biggest event stages
Complex and target-rich, major sporting events and world-renown activities present opportunities for threat actors to disrupt travel, commerce, communication and emergency services, and more. Learn how to manage the vast, external attack surface and defend world event infrastructures.
Intelligence reports
Shifting tactics fuel surge in business email compromise
Business email compromise (BEC) is on the rise now that cybercriminals can obscure the source of their attacks to be even more nefarious. Learn about CaaS and how to help protect your organization.
Intelligence reports
The convergence of IT and OT
Prevent 98% of cyberattacks against IoT and OT devices. Learn how cybersecurity hygiene can be used to protect against ransomware and cyber extortion.
Intelligence reports
Extortion economics
Ransomware, one of the most persistent and pervasive cyber threats, continues to evolve. Here is an in-depth look at ransomware as a service (Raas), the latest tool of cybercrime.
Intelligence reports
Identity is the new battleground
Identity-based attacks are the latest targets in the world of cybercrime. Learn how to get help protect your organization from identity-based cyber threats.
Get started
Join Microsoft events
Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
Talk to us
Join Microsoft’s tech community
Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.
Follow Microsoft Security