diff --git a/windows/security/book/index.md b/windows/security/book/index.md
index 3c58a2289b..8c0c2c3eb6 100644
--- a/windows/security/book/index.md
+++ b/windows/security/book/index.md
@@ -13,11 +13,14 @@ ms.date: 09/06/2024
Today’s organizations face a world of accelerated change, from marketplace fluctuation and sociopolitical events to the rapid adoption of new AI technologies. However, as organizations and industries innovate, so do increasingly sophisticated cybercriminals. Research shows that employees, including their devices, services, and identities, are at the center of attacks on businesses of all sizes. Some leading threats include identity attacks, ransomware, targeted phishing attempts, and business email compromise. [\[1\]](conclusion.md#footnote1).
-To thrive, organizations need security to work anywhere. [Microsoft's 2022 Work Trend Index][LINK-1] shows *cybersecurity issues and risks* are top concerns for business decision-makers. Business decision-makers worry about malware, stolen credentials, devices that lack security updates, and physical attacks on lost or stolen devices.
+To address the ever-growing and changing threat landscape, we announced the [Secure Future Initiative in November 2023]. The SFI endeavors to advance cybersecurity protection across all our company and products.
+Microsoft is committed to putting security above all else, with products and services that are secure by design and secure by default. We synthesize more than [65 trillion signals daily] to understand digital threats and criminal cyberactivity. [\[1\]](conclusion.md#footnote1). Through the SFI initiative we’ve dedicated the equivalent of 34,000 full-time engineers to the highest priority security tasks. We continuously apply what we learn from incidents to improve our security and privacy models, security architecture, and technical controls.
+
+All Remove below
In the past, a corporate network and software-based security were the first lines of defense. With an increasingly distributed and mobile workforce, attention shifted to hardware-based endpoint security. People are now the top target for cybercriminals, with 74% of all breaches due to human error, privilege misuses, stolen credentials, or social engineering. Most attacks are financially motivated, and credential theft, phishing, and exploitation of vulnerabilities are the primary attack vectors. Credential theft is the most prevalent attack vector, accounting for 50% of breaches.
-At Microsoft, we work hard to help organizations evolve and stay agile while protecting against modern threats. We help businesses and their users get secure, and stay secure. We [synthesize 43 trillion signals daily][LINK-2] to understand and protect against digital threats. We have more than 8,500 dedicated security professionals across 77 countries and over 15,000 partners in our security ecosystem striving to increase resilience for our customers[\[2\]](conclusion.md#footnote2).
+At Microsoft, we work hard to help organizations evolve and stay agile while protecting against modern threats. We help businesses and their users get secure, and stay secure. to understand and protect against digital threats. We have more than 8,500 dedicated security professionals across 77 countries and over 15,000 partners in our security ecosystem striving to increase resilience for our customers[\[2\]](conclusion.md#footnote2).
Businesses worldwide are moving toward [secure-by-design and secure-by-default strategies][LINK-3]. With these models, organizations choose products from manufacturers that consider security as a business requirement, not just a technical feature. With a secure-by-default strategy, businesses can proactively reduce risk and exposure to threats across their organization because products are shipped with security features already built-in and enabled.
@@ -25,6 +28,8 @@ To help businesses transform and thrive in a new era, we built Windows 11 to be
Discover why organizations of all sizes, including 90% of Fortune 500 companies, are taking advantage of the powerful default protection of Windows 11[\[4\]](conclusion.md#footnote4).
+remove
+
## Security priorities and benefits
### Security by design and security by default
@@ -57,6 +62,6 @@ In Windows 11, hardware and software work together to protect sensitive data fro
-[LINK-1]: https://www.microsoft.com/security/blog/2022/04/05/new-security-features-for-windows-11-will-help-protect-hybrid-work
-[LINK-2]: https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE5bcRe
+[LINK-1]: https://www.microsoft.com/en-us/trust-center/security/secure-future-initiative
+[LINK-2]: https://www.microsoft.com/en-us/security/security-insider/microsoft-digital-defense-report-2023
[LINK-3]: https://www.cisa.gov/securebydesign
\ No newline at end of file