Register for the October 30th web seminar featuring Microsoft Digital Defense Report 2024 insights.
Phishing
Meet the experts
Expert Profile: Homa Hayatyfar
Principal Data and Applied Science Manager Homa Hayatyfar describes the use of machine learning models to reinforce defenses, just one of many ways AI is changing the face of security.
Emerging threats
Feeding from the trust economy: social engineering fraud
Explore an evolving digital landscape where trust is both a currency and a vulnerability. Discover the social engineering fraud tactics cyber attackers use most, and review strategies that can help you identify and outmaneuver social engineering threats designed to manipulate human nature.
Intelligence reports
Digital threats from East Asia increase in breadth and effectiveness
Dive in and explore emerging trends in East Asia’s evolving threat landscape, where China conducts both widespread cyber and influence operations (IO), while North Korean cyber threat actors demonstrate growing sophistication.
Practical, cyber defense
Basic cyber hygiene prevents 99% of attacks
Basic cyber hygiene remains the best way to defend an organization’s identities, devices, data, apps, infrastructure, and networks against 99% of all cyber threats. Discover practical tips in a comprehensive guide.
Emerging threats
Breaking down business email compromise
Digital crimes expert Matt Lundy provides business email compromise examples, breaking down one of the most common and costly forms of cyberattack.
Intelligence reports
Shifting tactics fuel surge in business email compromise
Business email compromise (BEC) is on the rise now that cybercriminals can obscure the source of their attacks to be even more nefarious. Learn about CaaS and how to help protect your organization.
Meet the exp;erts
Insights from Iranian threat actor expert Simeon Kakpovi
Senior threat intelligence analyst Simeon Kakpovi talks about training the next generation of cyber defenders and overcoming the sheer tenacity of Iranian threat actors.
Emerging threats
Anatomy of a modern attack surface
Managing a modern attack surface requires the right threat intelligence. This report can help tilt the playing field in favor of cyber security defenders
Get started
Join Microsoft events
Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
Talk to us
Join Microsoft’s tech community
Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.
Follow Microsoft Security