Trace Id is missing

Vulnerabilities

A person in a trench coat and tie
Practical cyber defense

CISO Insider: Issue 3

Navigate today’s threat landscape with perspectives from CISOs, exclusive analysis, and recommendations from security leaders.
A logo of ABC letters and arrows
Practical cyber defense 

Learn the ABCs of Threat Hunting

Explore the ABCs of Threat Hunting Guide to get tips on how to hunt, identify, and mitigate cyberthreats to help become more cyber-resilient.
A computer screen with icons and a phone
Emerging threats

The unique security risk of IoT/OT devices

Protect your IoT/OT devices by decreasing network vulnerabilities and defending against cyber threats such as ransomware and threat actors.
A person in a black shirt
Meet the experts

Threat Intelligence, Head of IoT/OT Security Research David Atch

In our latest expert profile, we spoke with David Atch, the Head of IoT/OT Security Research at Microsoft, to talk about the growing security risks of IoT and OT connectivity.
A computer icons and a cellphone
Intelligence reports

The convergence of IT and OT

Prevent 98% of cyberattacks against IoT and OT devices. Learn how cybersecurity hygiene can be used to protect against ransomware and cyber extortion.
A person in black shirt
Meet the experts

Threat intelligence expert Emily Hacker

Threat Intelligence Analyst Emily Hacker discusses how her team stays on top of the changing ransomware as a service landscape and the measures they take to help catch pre-ransomware actors.
A blue and red circle with lines and dots
Emerging threats

Cyberthreat Minute: The scale and scope of worldwide cybercrime in 60 seconds

Within a 60-second window cybercrime can consist of password, attacks, DDoS attacks, ransomware, IoT attacks and phishing leading to lost revenue. persistent threats in the 2022 Microsoft Digital Defense Report.
A person wearing glasses and a striped shirt
Meet the experts

Expert analysis from inside the Microsoft Security Response Center (MSRC)

Spend a moment behind the scenes with the MSRC’s Russ McRee, who shares his thoughts on the state of modern security.
Red circles with gray arrow
Emerging threats

Anatomy of an external attack surface

Learn about threats to organizations’ external attack surface and how to help stay protected with Zero Trust
A person and person looking at a computer
Practical cyber defense

Using cybersecurity to help manage volatility in the global threat landscape

Protect against 98% of cyberattacks with cybersecurity hygiene. Get guidance to help make your organization more cyber resilient.
Abstract graphic of concentric circles in green, yellow, and white on a gray background.
Woman reading a book on a leather sofa in a cozy living room setting.
Get started

Join Microsoft events

Expand your expertise, learn new skills and build community with Microsoft events and learning opportunities.
A woman reading from a tablet while standing outside a building.
Talk to us

Join Microsoft’s tech community

Stay connected with 60k+ members and see latest community discussions on security, compliance, and identity.

Follow Microsoft