Skip to main content
Microsoft Security

Behind the scenes

Microsoft Security’s global network of security and intelligence teams includes engineers, researchers, data scientists, cybersecurity experts, threat hunters, geopolitical analysts, investigators, and frontline responders across 77 countries. 

Security researcher Dustin Duran on how to think like an attacker

06/15/2023

Threat intelligence expert Dustin Duran explains how his team adopts a threat actor mindset to better understand their adversaries and help keep customer organizations and security centers safe.

Watch expert profile

Insights from Iranian threat actor expert Simeon Kakpovi

05/18/2023

Senior threat intelligence analyst Simeon Kakpovi talks about training the next generation of cyber defenders and overcoming the sheer tenacity of Iranian threat actors.

See expert profile

Threat Intelligence, Head of IoT/OT Security Research David Atch

12/14/2022

In our latest expert profile, we spoke with David Atch, the Head of IoT/OT Security Research at Microsoft, to talk about the growing security risks of IoT and OT connectivity.

See the expert profile
Cybersecurity expert Matt Lundy discusses best practices to prevent ransomware attacks, business email compromise, and homoglyph domains

Discover how cybercriminals use tactics like social engineering to perpetrate attacks

11/04/2022

Matt Lundy of the Microsoft Digital Crimes Unit (DCU) describes how the experts of the Identity and Platform Enforcement team help keep customers safe from threats like ransomware, business email compromise, and homoglyph domains.

Watch video
Emily Hacker, threat intelligence analyst gives insight on how to stay on top of the ransomware as a service landscape

Threat intelligence expert Emily Hacker

08/02/2022

Threat Intelligence Analyst Emily Hacker discusses how her team stays on top of the changing ransomware as a service landscape and the measures they take to help catch pre-ransomware actors.

See the expert profile
Threat intelligence expert Nick Carr discusses ransomware trends and how to maximize cybersecurity protection

Behind the scenes with cybercrime and counter ransomware expert Nick Carr

06/22/2022

Nick Carr, Cybercrime Intelligence Team Lead at the Microsoft Threat Intelligence Center, discusses ransomware trends, explains what Microsoft is doing to protect customers from ransomware, and describes what organizations can do if they’ve been affected by it.

Watch video
Threat intelligence expert Steve Ginty provides tips for protecting yourself against threat actors and staying cyber vigilant

Expert Profile: Steve Ginty Behind the scenes with Microsoft’s threat intelligence expert

05/12/2022

Steve Ginty, director of cyber intelligence at Microsoft, talks about the importance of knowing your external attack surface, provides tips on effective security readiness, and identifies the most important step you can take to protect yourself against threat actors online.

Watch video
Cybersecurity expert Russ McRess gives insight into cyber protection and cyber resilience

Expert analysis from inside the Microsoft Security Response Center (MSRC)

05/06/2022

Spend a moment behind the scenes with the MSRC’s Russ McRee, who shares his thoughts on the state of modern security.

See the expert profile
Christopher Glyer: Principal Threat Intelligence Lead, Microsoft Threat Intelligence Center (MSTIC), discusses the importance of identity-focused solutions

Christopher Glyer: Principal Threat Intelligence Lead, MSTIC

02/09/2022

As Principal Threat Intelligence Lead with a focus on ransomware at the Microsoft Threat Intelligence Center (MSTIC), Christopher Glyer is part of the team that investigates how the most advanced threat actors access and exploit systems.

See the expert profile

More from Security Insider

Cyber Signals 4: Shifting tactics fuel surge in Business Email Compromise

Business email compromise (BEC) is on the rise now that cybercriminals can obscure the source of their attacks to be even more nefarious. Learn about cyber-crime as a service (CaaS) and how to help protect your organization.

Learn more

61% increase in phishing attacks. Know your modern attack surface.

To manage an increasingly complex attack surface, organizations must develop a comprehensive, resilient security posture. We walk through six key attack surface areas, highlight their unique challenges, and show how the right threat intelligence can help tilt the playing field in favor of defenders.

Learn more