Microsoft's Anatomy of a Breach

This HTML native site analyses the various stages of a company security breach from the hacker’s POV. Highlighting the systemic weaknesses hackers look for most, the site presents Microsoft’s solutions to avoiding and overcoming such gaps in security.

JavascriptD3GSAPjQuery

Microsoft and Column Five go way back and during my time there I had the opportunity to create this HTML native site that analyses the various stages of a company security breach from the hacker’s POV. The goal of this marketing website was to highlight the systemic weaknesses hackers look for most, the site presents Microsoft’s solutions to avoiding and overcoming such gaps in security.

Technologies used are GSAP, D3, Scroll Magic, and jQuery.

See Column Five's blog post about it.