2022:
Blogs
- Improving AI-based defenses to disrupt human-operated ransomware
- Microsoft expands its strategic partnership with CyLab (opens in new tab)
- Applications for artificial intelligence in Department of Defense cyber missions (opens in new tab)
Podcasts
2021:
Blogs
- Spotting brand impersonation with Swin transformers and Siamese neural networks
- Gamifying machine learning for stronger security and AI models
- Structured threat hunting: One way Microsoft Threat Experts prioritizes customer defense
- Microsoft announces recipients of academic grants for AI research on combating phishing
- Automating threat actor tracking: Understanding attacker behavior for intelligence and contextual alerting
- Combing through the fuzz: Using fuzzy hashing and deep learning to counter malware detection evasion techniques
Podcasts
- When Privacy Meets Security (opens in new tab)
- What the Fuzz?! (opens in new tab)
- Discovering Router Vulnerabilities with Anomaly Detection (opens in new tab)
- Ready or Not, Here A.I. Come! (opens in new tab)
- Knowing Your Enemy: Anticipating Attackers’ Next Moves (opens in new tab)
- Inside Insider Risk (opens in new tab)
- Celebrating Women in Security (opens in new tab)
- Tracking Nation State Actors (opens in new tab)
2020:
Blogs
- Inside Microsoft 365 Defender: Attack modeling for finding and stopping lateral movement
- Inside Microsoft 365 Defender: Solving cross-domain security incidents through the power of correlation analytics
- Inside Microsoft 365 Defender: Correlating and consolidating attacks into incidents – Microsoft Security Blog
- Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks
- Seeing the big picture: Deep learning-based fusion of behavior signals for threat detection
- Stopping Active Directory attacks and other post-exploitation behavior with AMSI and machine learning
Podcasts
- How to Catch a Villain With Math (opens in new tab)
- Protecting the Under-Secured With Bad Behavior (opens in new tab)
- Unmasking Malicious Scripts With Machine Learning (opens in new tab)
- Going Deep to Find the Unknown Unknowns (opens in new tab)