Register now to watch the on-demand web seminar featuring Microsoft Digital Defense Report 2024 insights.
Devices and Infrastructure
Meet the experts
Expert profile: Justin Turner
Principal Group Manager Justin Turner, Microsoft Security Research describes the three enduring challenges he’s seen throughout his cybersecurity career: configuration management, patching, and device visibility.
Meet the experts
Industry expert weighs in on security in manufacturing
Industry expert Myrna Soto breaks down the state of cybersecurity across manufacturing, discussing the sector’s emerging risks and opportunities, future legislative developments, and best practices to help strengthen defenses.
Intelligence reports
Microsoft Digital Defense Report 2022
In the 2022 edition of the Microsoft Digital Defense Report, Microsoft security experts illuminate today’s threat landscape, providing insights on emerging trends as well as historically persistent threats in the 2022 Microsoft Digital Defense Report.
Emerging threats
The unique security risk of IoT/OT devices
Protect your IoT/OT devices by decreasing network vulnerabilities and defending against cyber threats such as ransomware and threat actors.
Meet the experts
Threat Intelligence, Head of IoT/OT Security Research David Atch
In our latest expert profile, we spoke with David Atch, the Head of IoT/OT Security Research at Microsoft, to talk about the growing security risks of IoT and OT connectivity.
Intelligence reports
The convergence of IT and OT
Prevent 98% of cyberattacks against IoT and OT devices. Learn how cybersecurity hygiene can be used to protect against ransomware and cyber extortion.
Meet the experts
Discover how cybercriminals use tactics like social engineering to perpetrate attacks
Matt Lundy of the Microsoft Digital Crimes Unit (DCU) describes how the experts of the Identity and Platform Enforcement team help keep customers safe from threats like ransomware, business email compromise, and homoglyph domains.
Practical cyber defense
CISO Insider: Issue 2
Navigate today’s threat landscape with perspectives from CISOs, exclusive analysis, and recommendations from security leaders.
Emerging threats
Cyberthreat Minute: The scale and scope of worldwide cybercrime in 60 seconds
Within a 60-second window cybercrime can consist of password, attacks, DDoS attacks, ransomware, IoT attacks and phishing leading to lost revenue.
Practical cyber defense
Three ways to protect yourself from ransomware
Modern ransomware defense requires a lot more than just setting up detection measures. Discover three ways you can harden your network’s security against ransomware.
Meet the experts
Expert Profile: Steve Ginty Behind the scenes with Microsoft’s threat intelligence expert
Cyberthreat intelligence expert, Steve Ginty, gives tips on steps you can take against threat actors and maintain cybersecurity readiness.
Practical cyber defense
CISO Insider: Issue 1
Navigate today’s threat landscape with perspectives from CISOs, exclusive analysis, and recommendations from security leaders.
Intelligence reports
Cyber Resilience
Learn five fundamental steps to enhance your organizations cyber resilience and help protect against ransomware and other malicious cyberattacks.
Get started
Join Microsoft events
Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
Talk to us
Join Microsoft’s tech community
Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.
Follow Microsoft Security