Making the Leap to the Cloud
Listen now
Description
8 trillion. It’s kind of a big number, right? That’s how many signals are collected, processed, and analyzed by Microsoft’s security team every single day. Those signals are travelling from the cloud, coming through endpoints, coming through Bing, coming through Xbox. All of these signals are turned into intelligence, and if you’re a cloud user, that intelligence is an asset to your security. By making the leap to the cloud, the power, size, and flexibility of Microsoft’s threat intelligence becomes your resource.    In this episode of Security Unlocked, hosts Nic Fillingham and Natalia Godyla are re-joined by Microsoft’s Chief Security Advisor, Sarah Armstrong-Smith, to dive deeper into the back half of her four-part series on Becoming Resilient. We explore different cloud models, the shared responsibility of your cloud service provider, and the growing risks of insider threats.   In This Episode You Will Learn:   Best practices on switching to the cloud and ensuring utmost security  Why you need to adapt to stay ahead of threats  How to build security cleanly into your foundation and keep from it being a messy afterthought  Some Questions We Ask:   What do new users gain by moving to the cloud?   What errors are organizations making when moving to the cloud?  How do we effectively communicate with our security team about business decisions?   Resources:  Becoming resilient by understanding cybersecurity risks: Part 1 Becoming resilient by understanding cybersecurity risks: Part 2 Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective Becoming resilient by understanding cybersecurity risks: Part 4—navigating current threats Cloud Adoption Framework  View Sarah Armstrong-Smith on LinkedIn View Nic on LinkedIn View Natalia on LinkedIn  Related:   Listen to: Security Unlocked: CISO Series with Bret Arsenault Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.
More Episodes
The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; digital currencies are here to stay, no matter how many times you have to...
Published 02/16/22
Published 02/16/22
Ransomware attacks have never been so successful. The returns from these attacks are soaring and only becoming easier to conduct. In chapter two of the Microsoft Digital Defense Report, the growing threat of cybercrime is covered in great detail. As we continue to go over the MDDR, it's more...
Published 02/02/22