Description
8 trillion. It’s kind of a big number, right? That’s how many signals are collected, processed, and analyzed by Microsoft’s security team every single day. Those signals are travelling from the cloud, coming through endpoints, coming through Bing, coming through Xbox. All of these signals are turned into intelligence, and if you’re a cloud user, that intelligence is an asset to your security. By making the leap to the cloud, the power, size, and flexibility of Microsoft’s threat intelligence becomes your resource.
In this episode of Security Unlocked, hosts Nic Fillingham and Natalia Godyla are re-joined by Microsoft’s Chief Security Advisor, Sarah Armstrong-Smith, to dive deeper into the back half of her four-part series on Becoming Resilient. We explore different cloud models, the shared responsibility of your cloud service provider, and the growing risks of insider threats.
In This Episode You Will Learn:
Best practices on switching to the cloud and ensuring utmost security
Why you need to adapt to stay ahead of threats
How to build security cleanly into your foundation and keep from it being a messy afterthought
Some Questions We Ask:
What do new users gain by moving to the cloud?
What errors are organizations making when moving to the cloud?
How do we effectively communicate with our security team about business decisions?
Resources:
Becoming resilient by understanding cybersecurity risks: Part 1
Becoming resilient by understanding cybersecurity risks: Part 2
Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective
Becoming resilient by understanding cybersecurity risks: Part 4—navigating current threats
Cloud Adoption Framework
View Sarah Armstrong-Smith on LinkedIn
View Nic on LinkedIn
View Natalia on LinkedIn
Related:
Listen to: Security Unlocked: CISO Series with Bret Arsenault
Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.
The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; digital currencies are here to stay, no matter how many times you have to...
Published 02/16/22
Ransomware attacks have never been so successful. The returns from these attacks are soaring and only becoming easier to conduct. In chapter two of the Microsoft Digital Defense Report, the growing threat of cybercrime is covered in great detail. As we continue to go over the MDDR, it's more...
Published 02/02/22