Understand top trends in the threat landscape
Get our perspective on 2018 cybersecurity trends such as cryptocurrency mining, supply chain attacks, and phishing in the Security Intelligence Report, Volume 24.
New at RSAC—Microsoft Azure Sentinel and Threat Experts
Augment your security team with industry-leading AI and hands-on expertise introduced by Microsoft at RSAC 2019. Learn more about Microsoft Azure Sentinel and Microsoft Threat Experts.
![Graphic icon of a padlock with a blue dot in the middle representing intelligence Graphic icon of a padlock with a blue dot in the middle representing intelligence](https://webarchive.library.unt.edu/web/20190624184731im_/https://www.microsoft.com/onerfstatics/marketingsites-wcus-prod/_h/9be151e5/coreui.statics/images/1x1clear.gif)
Operations
Over 3,500 dedicated Microsoft cybersecurity professionals help protect, detect, and respond to threats – delivering security operations that work for you.
![Photograph of two people looking at monitors in foreground with other people working in background at the Microsoft Cyber Defense Operations Center. Photograph of two people looking at monitors in foreground with other people working in background at the Microsoft Cyber Defense Operations Center.](https://webarchive.library.unt.edu/web/20190624184731im_/https://www.microsoft.com/onerfstatics/marketingsites-wcus-prod/_h/9be151e5/coreui.statics/images/1x1clear.gif)
![Photograph of an IT person walking across the hallway in the back of a large data center. Photograph of an IT person walking across the hallway in the back of a large data center.](https://webarchive.library.unt.edu/web/20190624184731im_/https://www.microsoft.com/onerfstatics/marketingsites-wcus-prod/_h/9be151e5/coreui.statics/images/1x1clear.gif)
![Graphic icon of shield with lines leading to blue dots representing the pathways on a circuit board Graphic icon of shield with lines leading to blue dots representing the pathways on a circuit board](https://webarchive.library.unt.edu/web/20190624184731im_/https://www.microsoft.com/onerfstatics/marketingsites-wcus-prod/_h/9be151e5/coreui.statics/images/1x1clear.gif)
Technology
We use our experience to provide you with enterprise-class security technology.
![Graphic icon of two hands shaking in agreement Graphic icon of two hands shaking in agreement](https://webarchive.library.unt.edu/web/20190624184731im_/https://www.microsoft.com/onerfstatics/marketingsites-wcus-prod/_h/9be151e5/coreui.statics/images/1x1clear.gif)
Partnerships
Microsoft is driving a broad set of technology, industry, and policy partnerships for a heterogeneous world.
![Photograph of three people walking together as a group in an office building, one is carrying a laptop, one is carrying a tablet, and one is holding up a mobile device and talking while the other two are looking down at the screen. Photograph of three people walking together as a group in an office building, one is carrying a laptop, one is carrying a tablet, and one is holding up a mobile device and talking while the other two are looking down at the screen.](https://webarchive.library.unt.edu/web/20190624184731im_/https://www.microsoft.com/onerfstatics/marketingsites-wcus-prod/_h/9be151e5/coreui.statics/images/1x1clear.gif)
Improve your security and stay informed
![Image of a man watching a video on his laptop Image of a man watching a video on his laptop](https://webarchive.library.unt.edu/web/20190624184731im_/https://www.microsoft.com/onerfstatics/marketingsites-wcus-prod/_h/9be151e5/coreui.statics/images/1x1clear.gif)
CISO blog series
Learn about 4 priorities to achieve the largest security improvements.
![Image of a technician working in an IT server room Image of a technician working in an IT server room](https://webarchive.library.unt.edu/web/20190624184731im_/https://www.microsoft.com/onerfstatics/marketingsites-wcus-prod/_h/9be151e5/coreui.statics/images/1x1clear.gif)
AI cybersecurity impact for IoT
Read the blog![Image of three people in a conference room Image of three people in a conference room](https://webarchive.library.unt.edu/web/20190624184731im_/https://www.microsoft.com/onerfstatics/marketingsites-wcus-prod/_h/9be151e5/coreui.statics/images/1x1clear.gif)
Voice of the Customer
The Walsh Group found that Azure Active Directory gives them a competitive edge.
![Image of a security officer speaking into a walkie-talkie Image of a security officer speaking into a walkie-talkie](https://webarchive.library.unt.edu/web/20190624184731im_/https://www.microsoft.com/onerfstatics/marketingsites-wcus-prod/_h/9be151e5/coreui.statics/images/1x1clear.gif)
Zero Trust part 1
Identity and access management.
Security events
Infosecurity Europe
Join us at Infosecurity Europe, the information and cybersecurity community event June 4-6, 2019.
Microsoft Ignite 2019
Join us for a week of technical deep dives with security experts, hands-on experiences, and networking.