Microsoft Security Experts
Our expertise is now your expertise. Learn how to extend your ability to defend and manage with a new line of services from the experts at Microsoft.
Refine results
Topic
Products and services
Publish date
-
Microsoft speakers at Gartner Identity & Access Management Summit focus on permissions management, infrastructure attacks, and moving to cloud-based identity. -
Microsoft Defender Experts for Hunting proactively hunts threats
Microsoft Defender Experts for Hunting is now generally available. -
How security leaders can help their teams avoid burnout
Maria Markstedter, CEO of Azeria Labs, shares insights on the growing interest in Arm assembly and strategies to help security professionals avoid burnout. -
Why strong security solutions are critical to privacy protection
Former three-term Ontario Information and Privacy Commissioner Ann Cavoukian, Ph. -
Microsoft security experts outline next steps after compromise recovery
A compromise recovery, in general, means that we are implementing several years of work in cybersecurity in only six weeks. -
Building a safer world together with our partners—introducing Microsoft Security Experts
Technology alone is not enough to defend against cybercrime. -
Structured threat hunting: One way Microsoft Defender Experts for Hunting prioritizes customer defense
Our approach to threat hunting is designed to evaluate impact and escalate potential threats for investigation, based on how damaging the potential threat would be. -
CRSP: The emergency team fighting cyber attacks beside customers
CRSP is a worldwide team of cybersecurity experts operating in most countries, across all organizations, with deep expertise to secure an environment post-security breach and to help you prevent a breach in the first place. -
Automating threat actor tracking: Understanding attacker behavior for intelligence and contextual alerting
A probabilistic graphical modeling framework used by Microsoft 365 Defender research and intelligence teams for threat actor tracking enables us to quickly predict the likely threat group responsible for an attack, as well as the likely next attack stages. -
Modernizing your network security strategy
From the global pandemic to recent cyberattacks, our world has faced many challenges during the past 12 months. -
Lessons learned from the Microsoft SOC—Part 3d: Zen and the art of threat hunting
This blog provides lessons learned on how Microsoft hunts for threats in our IT environment and how you can apply these lessons to building or improving your threat hunting program. -
Microsoft Threat Protection leads in real-world detection in MITRE ATT&CK evaluation
The latest round of MITRE ATT&CK evaluations proved yet again that Microsoft customers can trust they are fully protected even in the face of such an advanced attack as APT29.