Microsoft's Anatomy of a Breach
This HTML native site analyses the various stages of a company security breach from the hacker’s POV. Highlighting the systemic weaknesses hackers look for most, the site presents Microsoft’s solutions to avoiding and overcoming such gaps in security.
Microsoft and Column Five go way back and during my time there I had the opportunity to create this HTML native site that analyses the various stages of a company security breach from the hacker’s POV. The goal of this marketing website was to highlight the systemic weaknesses hackers look for most, the site presents Microsoft’s solutions to avoiding and overcoming such gaps in security.
Technologies used are GSAP, D3, Scroll Magic, and jQuery.