{"id":1820,"date":"2018-05-30T19:00:57","date_gmt":"2018-05-30T19:00:57","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=83044"},"modified":"2018-05-30T19:00:57","modified_gmt":"2018-05-30T19:00:57","slug":"from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/","title":{"rendered":"From the ground up to the cloud: Microsoft\u2019s Intelligent Security supporting CISOs\u2019 cloud transformation"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/wp-content\/themes\/cloudperspectives\/dist\/images\/MSFT_logo_rgb_C-Gray_1200_x_627.png\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>It\u2019s no secret that Microsoft has embraced the cloud in a big way\u2014from enterprise solutions like Microsoft Azure to Office 365 and Windows. But a recent research report by Forrester focuses on an equally important shift in our approach to security\u2014integrating workforce and cloud security in ways that make them much easier for enterprise IT leaders to purchase and manage.<\/p>\n<p>As Dark Reading\u2019s Kelly Sheridan <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/how-microsoft-amazon-alphabet-are-reshaping-security\/d\/d-id\/1331664?elq_mid=84597&amp;elq_cid=26689789&amp;_mc=NL_DR_EDT_DR_weekly_20180503&amp;cid=NL_DR_EDT_DR_weekly_20180503&amp;elqTrackId=9e76e5085a644621b1cd5e752fd2e71d&amp;elq=05dcb11046034019976c3f128310595a&amp;elqaid=84597&amp;elqat=1&amp;elqCampaignId=30603\">points out<\/a>, Microsoft is focusing on \u201cbringing protections to where people are moving their work: into the cloud.\u201d Microsoft, like other cloud providers, is \u201cstomping into the security market, ready to shake things up and address the weaknesses they see in today\u2019s tools,\u201d she adds.<\/p>\n<p>Sheridan cites the Forrester research that includes a focus on Microsoft\u2019s \u201cplan to build security into each part of Azure, Office 365, and Windows\u201d\u2014\u2014a strategy, which, the researchers say, will be as disruptive to the security space as the cloud has been for the enterprise.<\/p>\n<h2>A shifting security challenge<\/h2>\n<p>Our emphasis on integration through and into the cloud, mirrors the shifts CISOs have made as their own enterprises have embraced the cloud, requiring them to coordinate cloud and on-premise security solutions.<\/p>\n<p>As summarized succinctly in Sheridan\u2019s Dark Reading post, Forrester\u2019s research highlights Microsoft\u2019s strengths in telemetry and artificial intelligence, which yield unparalleled insights into how attackers interact with not only our products, but also other applications that run on Windows and other Microsoft platforms.<\/p>\n<p>The report also cites Microsoft\u2019s efforts to target the enterprise market by \u201cmaking security easy to buy and use,\u201d Sheridan writes. Microsoft, she adds, \u201cbundles technologies and simplifies deployment for security teams, which can use preconfigured security policies for new servers and containers.\u201d From C-level execs to Sec-Ops, our customers tell us they are overwhelmed by the rapid pace at which new cyber threats are released in the wild. Microsoft believes there is a need for the industry to shift to this next generation of security defense.<\/p>\n<h2>Scale and integration<\/h2>\n<p>The Forrester report also notes that embedded solutions address one of the biggest challenges cloud-focused CISOs face: scalability.<\/p>\n<p>\u201cScalability isn\u2019t an issue,\u201d Sheridan writes. \u201cAs infrastructure and applications grow, so do cloud platforms. Teams don\u2019t need to worry about whether hardware can handle bandwidth upgrades or whether management servers can handle new endpoints.\u201d<\/p>\n<p>And we continue to expand the scope of our security offerings. At April\u2019s RSA Conference 2018, Microsoft made a series of announcements that deepen our commitment to end-to-end security. Azure Sphere brings our security efforts to the connected microcontroller units (MCUs) that make up the Internet of Things (IoT), while a broad suite of technologies that together we call \u201cMicrosoft 365 Intelligent Security\u201d emphasizes our commitment to integration. Intelligent Security offerings announced at RSA include a new API for Microsoft Graph that provides integrated data and alert reporting across security products, our Secure Score and Attack Simulator to help companies assess their security profiles, and additional support for strong authentication and threat prevention capabilities.<\/p>\n<h2>Disruption and drive<\/h2>\n<p>These shifts, according to Forrester, represent a significant disruption in the security marketplace. For CISOs, they also provide a strong argument for new thinking about security products in the enterprise and significant cost savings for moving to the cloud having security built in from the ground up. \u201cGone are the days when security leaders opted for separate antivirus tools in lieu of Windows Defender,\u201d Sheridan writes. \u201cNow many question the business\u2019 choice to buy an endpoint suite when Microsoft\u2019s services have security built in.\u201d<\/p>\n<p>At the same time, Forrester\u2019s researchers caution against \u201cgoing all in\u201d with any single vendor, and we agree. Cybersecurity is a broad and complex space, and no one vendor can do it all. That\u2019s why we\u2019re working with microcontroller unit manufacturers on our IoT solutions, participating in a cybersecurity technology agreement with nearly 35 companies across the industry, and acquiring best-of-breed technology from innovative companies like Adallom and Aorato to bolster our capabilities in such areas as cloud security and malware detection. And along with the millions of threat indicators identified by the Intelligent Security Graph API, we work with a wide range of organizations to gather and share intelligence on threat attacks in real time. Together, these moves represent our commitment to work with all partners to secure the enterprise\u2014a simple but powerful idea that, in the security space, may ultimately become the most disruptive force of all.<\/p>\n<p>READ MORE <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/05\/30\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Its no secret that Microsoft has embraced the cloud in a big wayfrom enterprise solutions like Microsoft Azure to Office 365 and Windows. But a recent research report by Forrester focuses on an equally important shift in our approach to securityintegrating workforce and cloud security in ways that make them much easier for enterprise IT Read more READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1821,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[254],"class_list":["post-1820","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>From the ground up to the cloud: Microsoft\u2019s Intelligent Security supporting CISOs\u2019 cloud transformation 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From the ground up to the cloud: Microsoft\u2019s Intelligent Security supporting CISOs\u2019 cloud transformation 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-30T19:00:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"From the ground up to the cloud: Microsoft\u2019s Intelligent Security supporting CISOs\u2019 cloud transformation\",\"datePublished\":\"2018-05-30T19:00:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\\\/\"},\"wordCount\":759,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation.png\",\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\\\/\",\"name\":\"From the ground up to the cloud: Microsoft\u2019s Intelligent Security supporting CISOs\u2019 cloud transformation 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation.png\",\"datePublished\":\"2018-05-30T19:00:57+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation.png\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Uncategorized\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/uncategorized\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"From the ground up to the cloud: Microsoft\u2019s Intelligent Security supporting CISOs\u2019 cloud transformation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From the ground up to the cloud: Microsoft\u2019s Intelligent Security supporting CISOs\u2019 cloud transformation 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/","og_locale":"en_US","og_type":"article","og_title":"From the ground up to the cloud: Microsoft\u2019s Intelligent Security supporting CISOs\u2019 cloud transformation 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-30T19:00:57+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"From the ground up to the cloud: Microsoft\u2019s Intelligent Security supporting CISOs\u2019 cloud transformation","datePublished":"2018-05-30T19:00:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/"},"wordCount":759,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation.png","articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/","url":"https:\/\/www.threatshub.org\/blog\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/","name":"From the ground up to the cloud: Microsoft\u2019s Intelligent Security supporting CISOs\u2019 cloud transformation 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation.png","datePublished":"2018-05-30T19:00:57+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation.png","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/from-the-ground-up-to-the-cloud-microsofts-intelligent-security-supporting-cisos-cloud-transformation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Uncategorized","item":"https:\/\/www.threatshub.org\/blog\/tag\/uncategorized\/"},{"@type":"ListItem","position":3,"name":"From the ground up to the cloud: Microsoft\u2019s Intelligent Security supporting CISOs\u2019 cloud transformation"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1820","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=1820"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1820\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/1821"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=1820"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=1820"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=1820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}