informa

Partner Perspectives

Why Shared Fate is a Better Way to Manage Cloud Risk
The shared responsibility model was good enough to cover the first years of the cloud revolution, but the model is showing its limitations. Shared fate is a more mature model for the future of cloud security.
September 15, 2023
The shared responsibility model was good enough to cover the first years of the cloud revolution, but the model is showing its limitations. Shared fate is a more mature model for the future of cloud security.
by Anton Chuvakin, Security Advisor at Office of the CISO, Google Cloud
September 15, 2023
4 MIN READ
Article
Professional Sports: The Next Frontier of Cybersecurity?
Sports teams, major leagues, global sporting associations, and entertainment venues are all home to valuable personal and business data. Here's how to keep them safe.
September 14, 2023
Sports teams, major leagues, global sporting associations, and entertainment venues are all home to valuable personal and business data. Here's how to keep them safe.
by Microsoft Security, Microsoft
September 14, 2023
3 MIN READ
Article
Security for Multicloud and Hybrid Cloud Environments
In multicloud environments, security challenges are most common at the connecting points between different clouds. Internal cloud security skill sets and cloud-native security tools are also key.
September 07, 2023
In multicloud environments, security challenges are most common at the connecting points between different clouds. Internal cloud security skill sets and cloud-native security tools are also key.
by Anton Chuvakin, Security Advisor at Office of the CISO, Google Cloud
September 07, 2023
4 MIN READ
Article
Overcoming Open Source Vulnerabilities in the Software Supply Chain
By securing access to code and running scans against all code changes, developers can better prevent — and detect — potential risks and vulnerabilities.
September 06, 2023
By securing access to code and running scans against all code changes, developers can better prevent — and detect — potential risks and vulnerabilities.
by Microsoft Security, Microsoft
September 06, 2023
3 MIN READ
Article
Considerations for Reducing Risk When Migrating to the Cloud
Proper planning is an essential part of reducing security and compliance risks before, during, and after a migration to a new cloud environment. 
August 28, 2023
Proper planning is an essential part of reducing security and compliance risks before, during, and after a migration to a new cloud environment. 
by Rob Sadowski, Director, Trust & Security Product Marketing for Google Cloud at Google
August 28, 2023
4 MIN READ
Article
Iran and the Rise of Cyber-Enabled Influence Operations
Iranian threat actors are combining offensive network ops with messaging and amplification to manipulate targets' perceptions and behavior. Here are three examples.
August 16, 2023
Iranian threat actors are combining offensive network ops with messaging and amplification to manipulate targets' perceptions and behavior. Here are three examples.
by Microsoft Security, Microsoft
August 16, 2023
3 MIN READ
Article
Closing Coverage Gaps Where Customer Resources Meet Cloud Environments
Protecting the spaces where private, public, and hybrid clouds meet users' technologies requires a cloud-centric approach.
August 09, 2023
Protecting the spaces where private, public, and hybrid clouds meet users' technologies requires a cloud-centric approach.
by Microsoft Security, Microsoft
August 09, 2023
4 MIN READ
Article
Unified XDR and SIEM Alleviate Security Alert Fatigue
By integrating detection response with information and event management, organizations can move beyond protective controls and harden their defenses.
August 02, 2023
By integrating detection response with information and event management, organizations can move beyond protective controls and harden their defenses.
by Microsoft Security, Microsoft
August 02, 2023
3 MIN READ
Article
Threat Intelligence Is Growing — Here's How SOCs Can Keep Up
By integrating XDR and SIEM, security professionals can automate correlation and prioritization of alerts across a broad swath of security infrastructure.
July 26, 2023
By integrating XDR and SIEM, security professionals can automate correlation and prioritization of alerts across a broad swath of security infrastructure.
by Microsoft Security, Microsoft
July 26, 2023
3 MIN READ
Article
Leverage Threat Intelligence, AI, and Data at Scale to Boost Cyber Defenses
By combining these leading-edge tools, security professionals can amplify the impact of their security strategies.
July 19, 2023
By combining these leading-edge tools, security professionals can amplify the impact of their security strategies.
by Microsoft Security, Microsoft
July 19, 2023
3 MIN READ
Article
6 Steps To Outsmart Business Email Compromise Scammers
Email fraud is a confidence game that costs the economy billions. An effective defense takes technology and vigilance.
July 06, 2023
Email fraud is a confidence game that costs the economy billions. An effective defense takes technology and vigilance.
by Microsoft Security, Microsoft
July 06, 2023
3 MIN READ
Article
3 Ways to Build a More Skilled Cybersecurity Workforce
With the right collaboration among employers, educators, and policymakers, we can come together to create a more secure environment for all. 
June 30, 2023
With the right collaboration among employers, educators, and policymakers, we can come together to create a more secure environment for all. 
by Microsoft Security, Microsoft
June 30, 2023
3 MIN READ
Article
3 Tips to Increase Hybrid and Multicloud Security
As cloud adoption grows, organizations need to rethink their approaches to securing hybrid cloud and multicloud environments.
June 29, 2023
As cloud adoption grows, organizations need to rethink their approaches to securing hybrid cloud and multicloud environments.
by Microsoft Security, Microsoft
June 29, 2023
3 MIN READ
Article
How Infrastructure as Code Can Help Minimize Human Error
Infrastructure as code lets organizations manage cloud infrastructure with the same versioning, testing, and automation processes they use for application code.
June 26, 2023
Infrastructure as code lets organizations manage cloud infrastructure with the same versioning, testing, and automation processes they use for application code.
by Microsoft Security, Microsoft
June 26, 2023
3 MIN READ
Article
6 Attack Surfaces You Must Protect
More connectivity means more potential ways into your enterprise, so securing every main attack surface is imperative.
June 22, 2023
More connectivity means more potential ways into your enterprise, so securing every main attack surface is imperative.
by Microsoft Security, Microsoft
June 22, 2023
4 MIN READ
Article