Skip to main content
Microsoft Security

Devices and infrastructure

Picture of expert Myrna Soto

Industry expert weighs in on security in manufacturing

04/04/2023

Industry expert Myrna Soto breaks down the state of cybersecurity across manufacturing, discussing the sector’s emerging risks and opportunities, future legislative developments, and best practices to help strengthen defenses.

Learn more

The unique security risk of IoT/OT devices

12/14/2022

Protect your IoT/OT devices by decreasing network vulnerabilities and defending against cyber threats such as ransomware and threat actors.

Learn more

Expert profile: David Atch

Head of IoT/OT Security Research, David Atch discusses how Zero Trust can be used to help protect against cyberattacks and maintain IT and OT security.

Learn more
Cyber risks to IoT and OT devices are on the rise

The convergence of IT and OT

Prevent 98% of cyberattacks against IoT and OT devices. Learn how cybersecurity hygiene can be used to protect against ransomware and cyber extortion.

Learn more
Microsoft Digital Crimes Unit (DCU) Matt Lundy, talks about how experts in Identity and Platform Enforcement team protect against cyber threats

Expert Profile: Matt Lundy

11/04/2022

Learn how the identity and platform enforcement team helps thwart cyber attacks such as ransomware, business email compromise, and homoglyph domains.

Learn more
Ilustration

Insights from trillions of daily security signals

Microsoft security experts illuminate today’s threat landscape, providing insights on emerging trends as well as historically persistent threats in the 2022 Microsoft Digital Defense Report.

Learn more
Woman standing with a tablet on the hand

CISO Insider: Issue 2

10/13/2022

Learn how extended detection response (XDR) can be used to help you manage vulnerabilities and help protect your organization against ransomware

Learn more
ilustration

Cyberthreat Minute: The scale of worldwide cybercrime

08/01/2022

Within a 60-second window cybercrime can consist of password, attacks, DDoS attacks, ransomware, IoT attacks and phishing leading to lost revenue.

Learn more

Three ways to protect yourself from ransomware

06/30/2022

Modern ransomware defense requires a lot more than just setting up detection measures. Discover three ways you can harden your network’s security against ransomware.

Learn more