Microsoft security intelligence

Security research, threat intelligence, and Microsoft Threat Protection news.

Experts on demand: Your direct line to Microsoft security insight, guidance, and expertise

Read more Experts on demand: Your direct line to Microsoft security insight, guidance, and expertise

Top 6 email security best practices to protect against phishing attacks and business email compromise

Read more Top 6 email security best practices to protect against phishing attacks and business email compromise

In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks

Read more In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks

CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools

Read more CISO series: Lessons learned from the Microsoft SOC—Part 3a: Choosing SOC tools

Forrester names Microsoft a Leader in 2019 Endpoint Security Suites Wave

Read more Forrester names Microsoft a Leader in 2019 Endpoint Security Suites Wave

Bring your own LOLBin: Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware

Read more Bring your own LOLBin: Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware

Operational resilience begins with your commitment to and investment in cyber resilience

Read more Operational resilience begins with your commitment to and investment in cyber resilience

Deep learning rises: New methods for detecting malicious PowerShell

Read more Deep learning rises: New methods for detecting malicious PowerShell

Gartner names Microsoft a Leader in 2019 Endpoint Protection Platforms Magic Quadrant

Read more Gartner names Microsoft a Leader in 2019 Endpoint Protection Platforms Magic Quadrant

From unstructured data to actionable intelligence: Using machine learning for threat intelligence

Read more From unstructured data to actionable intelligence: Using machine learning for threat intelligence

A case study in industry collaboration: Poisoned RDP vulnerability disclosure and response

Read more A case study in industry collaboration: Poisoned RDP vulnerability disclosure and response

How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection

Read more How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection