Select Page
Diagram showing pairs of machine learning models on the endpoint and in the cloud using AMSI to detect malicious scripts

Stopping Active Directory attacks and other post-exploitation behavior with AMSI and machine learning

When attackers successfully breach a target network, their typical next step is to perform reconnaissance of the network, elevate their privileges, and move laterally to reach specific machines or spread as widely as possible. For these activities, attackers often probe ... continue reading

Bringing AI supercomputing to customers

The trend toward the use of massive AI models to power a large number of tasks is changing how AI is built. At Microsoft Build 2020, we shared our vision for AI at Scale utilizing state-of-the-art AI supercomputing in Azure ... continue reading
Image of the Human Capital Cycle

Empower your analysts to reduce burnout in your security operations center

Effective cybersecurity starts with a skilled and empowered team. In a world with more remote workers and an evolving threat landscape, you need creative problem solvers defending your organization. Unfortunately, many traditional security organizations operate in a way that discourages ... continue reading

Guiding principles of our identity strategy: staying ahead of evolving customer needs

Last June, when I shared the 5 principles driving a customer-obsessed identity strategy at Microsoft, many of you had embraced the idea of a boundaryless environment, but relatively few had implemented it in practice. A global pandemic made remote access ... continue reading
Quadra1.png

3 tips to grow your Microsoft partner identity-driven security business

Hello! Today’s “Voice of the Partner” story is written by Prashanth Subramanian, Manikandan Rajagopal, and Balaji Ganesan of Quadra. Quadra has been a global Partner of the Year award winner/finalist for over 15 years. In this blog they explain how ... continue reading

Empowering women technology entrepreneurs to build enterprise-ready solutions

Every spring I attend the Women in Cloud Summit which is hosted on Microsoft’s Redmond campus. The Summit brings together entrepreneurs and other members of the community to connect small business owners to people that can help. Listening to the ... continue reading
Diagram showing process tree

Seeing the big picture: Deep learning-based fusion of behavior signals for threat detection

The application of deep learning and other machine learning methods to threat detection on endpoints, email and docs, apps, and identities drives a significant piece of the coordinated defense delivered by Microsoft Threat Protection. Within each domain as well as ... continue reading

Prevent and detect more identity-based attacks with Azure Active Directory

Security incidents often start with just one compromised account. Once an attacker gets their foot in the door, they can escalate privileges or gather intelligence that helps them reach their goals. This is why we say that identity is the ... continue reading
Microsoft Intelligent Security Association expands to include managed security service providers

Microsoft Intelligent Security Association expands to include managed security service providers

We’d planned a splashy party at Microsoft Inspire to announce our newest Microsoft Intelligent Security Association (MISA) members and introduce them to association members, but given our world today, I am instead picturing you reading this announcement curled up in ... continue reading
Solution Architecture

COVID-19 data analytics and reporting with Azure Databricks and Azure SQL

With the evolving need to keep up with growing data volumes, increased data dependency on the business decision making process and the evolution of data platforms with Cloud Computing, enterprises have widely adopted Unified Analytics systems, Data Warehouses and Data ... continue reading