Where security begins
Security doesn’t begin at the moment of attack, it starts far earlier, in the quiet work of researchers who hunt for the vulnerabilities that could one day become weaponized.
Every time a zero-day is uncovered, an incident is contained, or a threat actor’s supply chain is dismantled is the result of an end-to-end intelligence loop. At Microsoft, that loop moves from signal to insight, from detection to disruption.
In our first three episodes of Inside Microsoft Threat Intelligence, we explored how each part of that loop comes to life:
- Disruption: Sherrod DeGrippo shared how our threat intelligence led to the disruption of Storm-1152, a threat actor group representing one of the many ways cybercrime operates at global scale and is becoming commercialized. We also covered how attribution and enforcement can stop it in its tracks.
- Response: Microsoft Incident Response revealed what happens when calm leadership and collaboration turn crisis into containment. Adrian Hill offered his unvarnished perspective on the role resilience plays during incident response.
- Hunting: The Modern Threat Hunter showed how curiosity and data-driven detection connect faint signals into early warning systems. Thomas Ball shared how he uses AI to form hypothesis and gets into the mindset of a threat actor.
Now we turn to the foundation that fuels it all, security research, through the lens of Principal Security Researcher Jonathan Bar Or (JBO).
JBO represents the proactive protection pillar of Microsoft’s end-to-end threat intelligence. His work demonstrates how finding flaws before attackers exploit them leads to protections not just in Windows, but across every platform our customers rely on.
Follow Microsoft Security