Trace Id is missing

Meet the experts

A person standing in front of a computer screen
Nation state

On the frontlines: Decoding Chinese threat actor tactics and techniques 

Microsoft Threat Intelligence China experts Sarah Jones and Judy Ng join Microsoft Threat Intelligence Strategy director Sherrod DeGrippo to discuss the geopolitical landscape while providing advice and insight on modern cybersecurity careers.
A person with curly hair wearing glasses
Supply chain

Industry expert weighs in on security in manufacturing

Industry expert Myrna Soto breaks down the state of cybersecurity across manufacturing, discussing the sector’s emerging risks and opportunities, future legislative developments, and best practices to help strengthen defenses.
A person smiling for a picture
Nation state

Putting cyber threat intelligence into geopolitical context

Threat intelligence expert Fanta Orr explains how threat intelligence analysis uncovers the “why” behind cyberthreat activity and helps better protect customers who might be vulnerable targets.
A person standing in front of a white arrow
Threat actor

Expert profile: Justin Turner

Principal Group Manager Justin Turner, Microsoft Security Research describes the three enduring challenges he’s seen throughout his cybersecurity career: configuration management, patching, and device visibility.
A person with a mustache standing in front of white arrow
Multifactor authentication

Expert Profile: Dustin Duran

Threat intelligence expert Dustin Duran explains how his team adopts a threat actor mindset to better understand their adversaries and help keep customer organizations and security centers safe.
A person in a suit
Threat actor

Insights from Iranian threat actor expert Simeon Kakpovi

Senior threat intelligence analyst Simeon Kakpovi talks about training the next generation of cyber defenders and overcoming the sheer tenacity of Iranian threat actors.
A person in a black shirt

Threat Intelligence, Head of IoT/OT Security Research David Atch

In our latest expert profile, we spoke with David Atch, the Head of IoT/OT Security Research at Microsoft, to talk about the growing security risks of IoT and OT connectivity.
A person in a suit and tie
Social engineering

Discover how cybercriminals use tactics like social engineering to perpetrate attacks

Matt Lundy of the Microsoft Digital Crimes Unit (DCU) describes how the experts of the Identity and Platform Enforcement team help keep customers safe from threats like ransomware, business email compromise, and homoglyph domains.
A girl in a black shirt

Threat intelligence expert Emily Hacker

Threat Intelligence Analyst Emily Hacker discusses how her team stays on top of the changing ransomware as a service landscape and the measures they take to help catch pre-ransomware actors.
A person smiling at the camera

Behind the scenes with cybercrime and counter ransomware expert Nick Carr

Nick Carr, Cybercrime Intelligence Team Lead at the Microsoft Threat Intelligence Center, discusses ransomware trends, explains what Microsoft is doing to protect customers from ransomware, and describes what organizations can do if they’ve been affected by it.
A person smiling in front of a red and white background
Threat actor

Expert Profile: Steve Ginty Behind the scenes with Microsoft’s threat intelligence expert

Steve Ginty, director of cyber intelligence at Microsoft, talks about the importance of knowing your external attack surface, provides tips on effective security readiness, and identifies the most important step you can take to protect yourself against threat actors online.
A person wearing glasses and a striped shirt
Multifactor authentication

Expert analysis from inside the Microsoft Security Response Center (MSRC)

Spend a moment behind the scenes with the MSRC’s Russ McRee, who shares his thoughts on the state of modern security.
A person in a suit

Christopher Glyer: Principal Threat Intelligence Lead, MSTIC

As Principal Threat Intelligence Lead with a focus on ransomware at the Microsoft Threat Intelligence Center (MSTIC), Christopher Glyer is part of the team that investigates how the most advanced threat actors access and exploit systems.
Abstract graphic of concentric circles in green, yellow, and white on a gray background.
Woman reading a book on a leather sofa in a cozy living room setting.
Get started

Join Microsoft events

Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
A woman reading from a tablet while standing outside a building.
Talk to us

Join Microsoft’s tech community

Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.

Follow Microsoft