Trace Id is missing

Cyber Resilience

A person smiling for a picture
Meet the experts

Putting cyber threat intelligence into geopolitical context

Threat intelligence expert Fanta Orr explains how threat intelligence analysis uncovers the “why” behind cyberthreat activity and helps better protect customers who might be vulnerable targets.
A logo of ABC letters and arrows
Practical cyber defense

Learn the ABCs of Threat Hunting

Explore the ABCs of Threat Hunting Guide to get tips on how to hunt, identify, and mitigate cyberthreats to help become more cyber-resilient.
A shield with coins and wires
Emerging threats

Protecting yourself from holiday-season DDoS attacks

See what drives criminals to increase DDoS activity during the holidays and learn what you can do to help protect your organization
A person standing in front of a computer screen
Meet the experts 

Threat Intelligence, Head of IoT/OT Security Research David Atch

In our latest expert profile, we spoke with David Atch, the Head of IoT/OT Security Research at Microsoft, to talk about the growing security risks of IoT and OT connectivity.
A computer icons and a cellphone
Intelligence reports

The convergence of IT and OT

Prevent 98% of cyberattacks against IoT and OT devices. Learn how cybersecurity hygiene can be used to protect against ransomware and cyber extortion.
Emerging threats

Propaganda in the digital age: How cyber influence operations erode trust

Cyber influence operations are a prevalent tactic being used in the world of cybercrime to erode trust in the digital age.
A person in a suit and tie
Meet the experts

Discover how cybercriminals use tactics like social engineering to perpetrate attacks

Matt Lundy of the Microsoft Digital Crimes Unit (DCU) describes how the experts of the Identity and Platform Enforcement team help keep customers safe from threats like ransomware, business email compromise, and homoglyph domains.
A person holding a tablet
Supply chain

CISO Insider: Issue 2

Navigate today’s threat landscape with perspectives from CISOs, exclusive analysis, and recommendations from security leaders.
A yellow circle with blue and red dots
Intelligence reports

Extortion economics

Ransomware, one of the most persistent and pervasive cyber threats, continues to evolve. Here is an in-depth look at ransomware as a service (Raas), the latest tool of cybercrime.
A person talking to another person
Practical cyber defense

Three ways to protect yourself from ransomware

Modern ransomware defense requires a lot more than just setting up detection measures. Discover three ways you can harden your network’s security against ransomware
A person smiling at the camera
Meet the experts

Behind the scenes with cybercrime and counter ransomware expert Nick Carr

Nick Carr, Cybercrime Intelligence Team Lead at the Microsoft Threat Intelligence Center, discusses ransomware trends, explains what Microsoft is doing to protect customers from ransomware, and describes what organizations can do if they’ve been affected by it.
Intelligence Reports

Defending Ukraine: Early Lessons from the Cyber War

How cyber-attacks and cyber influence operations are being used in the war between Russian and the Ukraine.
A person working on a computer
Emerging threats

Protect your organization from ransomware

Guidance for protecting your organization against ransomware.
A red and white arrows on a gray background
Emerging threats

Ransomware-as-a-service: The new face of industrialized cybercrime

Discover how to protect your organization from Ransomware-as-a-service (RaaS), a tactic that is gaining serious traction in the world of cybercrime.
A person smiling for the camera
Meet the experts

Expert Profile: Steve Ginty Behind the scenes with Microsoft’s threat intelligence expert

Steve Ginty, director of cyber intelligence at Microsoft, talks about the importance of knowing your external attack surface, provides tips on effective security readiness, and identifies the most important step you can take to protect yourself against threat actors online.
A map of the world
Intelligence Reports

Special Report: Ukraine

Russian threat actors have launched increasingly disruptive and visible cyberattacks against Ukraine and have included activities such as phishing, reconnaissance, and attempts to compromise public information sources.
Red circle with gray arrow
Emerging threats

Anatomy of an external attack surface

Learn about threats to organizations’ external attack surface and how to help stay protected with Zero Trust.
A person and person looking at a computer
Practical cyber defense

Using cybersecurity to help manage volatility in the global threat landscape

Protect against 98% of cyberattacks with cybersecurity hygiene. Get guidance to help make your organization more cyber resilient.
A person holding a computer in a warehouse
Practical. cyber defense

CISO Insider: Issue 1

Navigate today’s threat landscape with perspectives from CISOs, exclusive analysis, and recommendations from security leaders.
A blue background with a red circle and a black circle with white circles
Intelligence reports

Cyber Resilience Report

Learn five fundamental steps to enhance your organizations cyber resilience and help protect against ransomware and other malicious cyberattacks.
Abstract graphic of concentric circles in green, yellow, and white on a gray background.
Woman reading a book on a leather sofa in a cozy living room setting.
Get started

Join Microsoft events

Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
A woman reading from a tablet while standing outside a building.
Talk to us

Join Microsoft’s tech community

Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.

Follow Microsoft