Threat intelligence lives at the heart of cybersecurity strategy
Threat intelligence often gets reduced to raw data: indicators of compromise, profiles of known actors, or sheer signal volume. But at Microsoft, threat intelligence is more than just awareness, it’s an engine of protection, action, and disruption. At its core, threat intelligence may be designed to answer a single question and drive a specific action; however, the real value comes from other security teams using derivatives of finished intelligence to detect, defend, and defang threats faster.
This miniseries offers a behind-the-scenes look at how Microsoft Threat Intelligence works in the real world. Through four distinct stories, we’ll show how threat intelligence powers our end-to-end security strategy, from proactively stopping zero-days to helping customers through major incidents and taking legal action against cybercriminals.
We begin with Sherrod DeGrippo, Director of Threat Intelligence Strategy, and the story of Storm-1152, a group responsible for creating and selling hundreds of millions of fraudulent Microsoft accounts. This is more than a tale of one actor. It’s about how Microsoft disrupts the ecosystem that fuels ransomware, fraud, and abuse, and why that disruption matters.
Follow Microsoft Security