Trace Id is missing

Expert Profile: Homa Hayatyfar

A girl with long hair
“This reality propels us to maintain a forward-looking stance, ensuring our resilience and readiness.”
—Homa Hayatyfar 

Principal Data and Applied Science Manager, Detection Analytics Manager

Homa Hayatyfar has seen how pathways to a career in cybersecurity are often nonlinear. She arrived at her career in cybersecurity by way of a research background in biochemistry and molecular biology—along with a passion for solving complex puzzles—and she believes that may be what the industry needs more of.

“The diversity of technical and soft skill competencies is how I build a team and is one of the biggest strengths I see at Microsoft. As Microsoft builds more diverse teams, which include those with the same demographics as attackers themselves, we continue to expand our threat intelligence capabilities,” she says.

She says no day is the same working in cybersecurity, especially the intersection of cybersecurity and data science. As part of the data science arm to Microsoft’s security operations team, Homa’s work is to take an immense amount of data and transform those insights into practical steps to tackle potential risks head on, refining threat detection methods and using machine learning models to reinforce Microsoft’s defenses.

“Analyzing data has been the main catalyst propelling my career in cybersecurity. I specialize in securing digital landscapes and extracting insights from complex datasets.”

As adversaries have evolved, she says, so has Microsoft, consistently focusing on the perpetual evolution of adversaries to stay ahead. Being a frequently targeted company propels Microsoft to maintain a forward-looking stance to ensure resilience and readiness. As adversaries have evolved, she says, so has Microsoft, consistently focusing on the perpetual evolution of adversaries to stay ahead. Being a frequently targeted company propels Microsoft to maintain a forward-looking stance to ensure resilience and readiness. This reality propels us to maintain a forward-looking stance, ensuring our resilience and readiness, she says.

Homa says attackers will generally gravitate to what’s easy and can be automated. The reason they persist with social engineering and traditional attacks like phishing, for example, is because it’s effective—all it takes is one successful attempt to lure someone into sharing information, clicking a malicious link, or granting access to sensitive files. In the same way, attackers are increasingly looking to AI to help them do more.

A person silhouette made of code holding a mask and stepping out of a phone. They are followed by red bubbles representing threat actors.
Featured

Feeding from the trust economy: social engineering fraud

Explore an evolving digital landscape where trust is both a currency and a vulnerability. Discover the social engineering fraud tactics cyber attackers use most, and review strategies that can help you identify and outmaneuver social engineering threats designed to manipulate human nature.

“AI can help attackers bring more sophistication to their attacks, and they have resources to throw at it. We’ve seen this with the 300+ threat actors Microsoft tracks, and we use AI to protect, detect, and respond.”

For companies looking to protect themselves, Homa stresses that the fundamentals matter: “Layering to add extra barriers such as applying Zero Trust principles, data protection, and multifactor authentication can protect against many of these attacks.”

“To customers in industries outside of government, do not underestimate your risk of nation state network intrusion.”

Related articles

Security is only as good as your threat intelligence

More reinforcements have arrived. John Lambert, Threat intelligence leader explains how AI enhances the threat intelligence community.

Navigating cyber threats and strengthening defenses in the era of AI

Advances in artificial intelligence (AI) present new threats—and opportunities—for cybersecurity. Discover how threat actors use AI to conduct more sophisticated attacks, then review the best practices that help protect against traditional and AI-enabled cyberthreats.

Expert profile: Justin Turner

Principal Group Manager Justin Turner, Microsoft Security Research describes the three enduring challenges he’s seen throughout his cybersecurity career: configuration management, patching, and device visibility.