Loading...

Making the Leap to the Cloud

Making the Leap to the Cloud

In this episode of Security Unlocked, Sarah Armstrong-Smith, Microsoft's Chief Security Advisor, talks about how by moving to the cloud, you can gain the power, size, and flexibility of Microsoft’s threat intelligence as your resource. The discussion revolves around the back half of her four-part series on Becoming Resilient, and delves into different cloud models, the shared responsibility of cloud service providers, and the rising risks of insider threats. Throughout the podcast, Sarah and hosts Nic Fillingham and Natalia Godyla discuss best practices for adapting to the cloud, ensuring utmost security, and building security foundations into your system, rather than as an afterthought.

The team also highlights the importance of staying ahead of potential threats and errors made by organizations while moving to the cloud. They also detail how to communicate effectively with the security team while making important business decisions. If you're looking to understand the importance of cloud security and best practices for moving to the cloud, you won't want to miss this insightful podcast episode.

Security Unlocked is a podcast produced by Microsoft and distributed as part of The CyberWire Network and can be accessed on Spotify.

Published on:

Learn more
Security Unlocked
Security Unlocked

Security Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and follow us!

Share post:

Related posts

Maximize cloud value by optimizing your migration

Are you looking to maximize your cloud investment? Look no further than Azure, the cloud platform that can help you streamline your migration ...

1 year ago

Episode 79: Threat Intelligence with MSTICPy

Join Michael and Sarah as they explore the world of Threat Intelligence with MSTICPy in this informative episode. Their special guest, Thomas ...

1 year ago

Configuration Change – Microsoft Defender for Cloud Apps threat protection policies

Microsoft is making changes to the default threat protection policies for Microsoft Defender for Cloud Apps. These policies will now be disabl...

1 year ago

What is a Cloud Adoption Security Review?

What is a Cloud Adoption Security Review? The Cloud Adoption Security Review (CASR) is aimed to self-assess an Azure landing zone (A...

1 year ago

Microsoft Defender for Threat Intelligence

In this episode, cybersecurity triumphs over threat intelligence as we delve into the topic of Microsoft Defender. Joined by guests Rijuta Kap...

2 years ago

Secure your hybrid, multicloud, and edge environments with cloud-based threat detection

Learn how to secure your hybrid, multicloud, and edge environments with cloud-based threat detection in this informative video. The video high...

2 years ago

Defending Federal Systems with the Microsoft Sentinel Threat Analysis & Response Solution

Managing security coverage and threat detection capabilities in federal agencies is increasingly crucial, and Microsoft offers a singular solu...

2 years ago

Microsoft Cybersecurity Reference Architectures

In this podcast episode, Mark discusses the Microsoft Cybersecurity Reference Architectures (MCRA) and the Cloud Adoption Framework (CAF). The...

2 years ago

Episode 426 - Defender for the Cloud

In this episode, Audrey Long, a senior security software engineer at Microsoft, sheds light on the significance of the Defender for the Cloud ...

2 years ago
Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!
* Yes, I agree to the privacy policy