Track down your adversaries in the free cybersecurity detective game. Play now.
Meet the experts
Nation state
On the frontlines: Decoding Chinese threat actor tactics and techniques
Microsoft Threat Intelligence China experts Sarah Jones and Judy Ng join Microsoft Threat Intelligence Strategy director Sherrod DeGrippo to discuss the geopolitical landscape while providing advice and insight on modern cybersecurity careers.
Supply chain
Industry expert weighs in on security in manufacturing
Industry expert Myrna Soto breaks down the state of cybersecurity across manufacturing, discussing the sector’s emerging risks and opportunities, future legislative developments, and best practices to help strengthen defenses.
Nation state
Putting cyber threat intelligence into geopolitical context
Threat intelligence expert Fanta Orr explains how threat intelligence analysis uncovers the “why” behind cyberthreat activity and helps better protect customers who might be vulnerable targets.
Threat actor
Expert profile: Justin Turner
Principal Group Manager Justin Turner, Microsoft Security Research describes the three enduring challenges he’s seen throughout his cybersecurity career: configuration management, patching, and device visibility.
Multifactor authentication
Expert Profile: Dustin Duran
Threat intelligence expert Dustin Duran explains how his team adopts a threat actor mindset to better understand their adversaries and help keep customer organizations and security centers safe.
Threat actor
Insights from Iranian threat actor expert Simeon Kakpovi
Senior threat intelligence analyst Simeon Kakpovi talks about training the next generation of cyber defenders and overcoming the sheer tenacity of Iranian threat actors.
IoT/OT
Threat Intelligence, Head of IoT/OT Security Research David Atch
In our latest expert profile, we spoke with David Atch, the Head of IoT/OT Security Research at Microsoft, to talk about the growing security risks of IoT and OT connectivity.
Social engineering
Discover how cybercriminals use tactics like social engineering to perpetrate attacks
Matt Lundy of the Microsoft Digital Crimes Unit (DCU) describes how the experts of the Identity and Platform Enforcement team help keep customers safe from threats like ransomware, business email compromise, and homoglyph domains.
Ransomware
Threat intelligence expert Emily Hacker
Threat Intelligence Analyst Emily Hacker discusses how her team stays on top of the changing ransomware as a service landscape and the measures they take to help catch pre-ransomware actors.
Ransomware
Behind the scenes with cybercrime and counter ransomware expert Nick Carr
Nick Carr, Cybercrime Intelligence Team Lead at the Microsoft Threat Intelligence Center, discusses ransomware trends, explains what Microsoft is doing to protect customers from ransomware, and describes what organizations can do if they’ve been affected by it.
Threat actor
Expert Profile: Steve Ginty Behind the scenes with Microsoft’s threat intelligence expert
Steve Ginty, director of cyber intelligence at Microsoft, talks about the importance of knowing your external attack surface, provides tips on effective security readiness, and identifies the most important step you can take to protect yourself against threat actors online.
Multifactor authentication
Expert analysis from inside the Microsoft Security Response Center (MSRC)
Spend a moment behind the scenes with the MSRC’s Russ McRee, who shares his thoughts on the state of modern security.
Identity
Christopher Glyer: Principal Threat Intelligence Lead, MSTIC
As Principal Threat Intelligence Lead with a focus on ransomware at the Microsoft Threat Intelligence Center (MSTIC), Christopher Glyer is part of the team that investigates how the most advanced threat actors access and exploit systems.
Get started
Join Microsoft events
Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
Talk to us
Follow Microsoft Security