{"id":32587,"date":"2020-01-03T14:45:42","date_gmt":"2020-01-03T14:45:42","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=543530"},"modified":"2020-01-03T14:45:42","modified_gmt":"2020-01-03T14:45:42","slug":"celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/","title":{"rendered":"Celebrating Decades of Success with Microsoft at the Security 20\/20 Awards"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"171\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/01\/MS-2020-300x171.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/01\/MS-2020-300x171.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/01\/MS-2020-1024x584.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/01\/MS-2020-768x438.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/01\/MS-2020-640x365.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/01\/MS-2020-900x513.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/01\/MS-2020-440x251.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/01\/MS-2020-380x217.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/01\/MS-2020.jpg 1489w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/p>\n<p>Effective collaboration is key to the success of any organization. But perhaps none more so than those working towards the common goal of securing our connected world. That\u2019s why Trend Micro has always been keen to reach out to industry partners in the security ecosystem, to help us collectively build a safer world and improve the level of protection we can offer our customers. As part of these efforts, we\u2019ve worked closely with Microsoft for decades.<\/p>\n<p>Trend Micro is therefore doubly honored to be at the Microsoft Security 20\/20 awards event in February, with nominations for two of the night\u2019s most prestigious prizes.<\/p>\n<p><strong>Better together<\/strong><\/p>\n<p>No organization exists in a vacuum. The hi-tech, connectivity-rich nature of modern business is the source of its greatest power, but also one of its biggest weaknesses. Trend Micro\u2019s mission from day one has been to make this environment as safe as possible for our customers. But we learned early on that to deliver on this vision, we had to collaborate. That\u2019s why we work closely with the world\u2019s top platform and technology providers \u2014 to offer protection that is seamless and optimized for these environments.<\/p>\n<p>As a <a href=\"https:\/\/www.trendmicro.com\/en_gb\/partners\/explore-alliance-partners\/Microsoft.html\">Gold Application Development Partner<\/a> we\u2019ve worked for years with Microsoft to ensure our security is tightly integrated into its products, to offer protection for Azure, Windows and Office 365 customers \u2014 at the endpoint, on servers, for email and in the cloud. It\u2019s all about simplified, optimized security designed to support business agility and growth.<\/p>\n<p><strong>Innovating our way to success<\/strong><\/p>\n<p>This is a vision that comes from the very top. For over three decades, our CEO and co-founder Eva Chen has been at the forefront of industry leading technology innovation and collaborative success at Trend Micro. Among other things during that time, we\u2019ve released:<\/p>\n<table>\n<tbody readability=\"4.5\">\n<tr readability=\"9\">\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>The world\u2019s first hardware-based system lockdown technology (StationLock)<\/li>\n<li>Innovative internet gateway virus protection (InterScan VirusWall)<\/li>\n<li>The industry\u2019s first two-hour virus response service-level agreement<\/li>\n<li>The first integrated physical-virtual security offering, with agentless threat protection for virtualized desktops (VDI) and data centers (Deep Security)<\/li>\n<li>The first ever mobile app reputation service (MARS)<\/li>\n<li>AI-based writing-style analysis for protection from Business Email Compromise (Writing Style DNA)<\/li>\n<li>Cross-layer detection and response for endpoint, email, servers, &amp; network combined (XDR)<\/li>\n<li>Broadest cloud security platform as a service (Cloud One)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Two awards<\/strong><\/p>\n<p>We\u2019re delighted to have been singled out for two prestigious awards at the Microsoft Security 20\/20 event, which will kick off RSA Conference this year:<\/p>\n<p><strong>Customer Impact<\/strong><\/p>\n<p>At Trend Micro, the customer is at the heart of everything we do. It\u2019s the reason we have hundreds of researchers across 15 threat centers around the globe leading the fight against emerging black hat tools and techniques. It\u2019s why we partner with leading technology providers like Microsoft. And it\u2019s why the channel is so important for us.<\/p>\n<p><strong>Industry Changemaker: Eva Chen<\/strong><\/p>\n<p>It goes without saying that our CEO and co-founder is an inspirational figure within Trend Micro. Her vision and strong belief that our only real competition as cybersecurity vendors are the bad guys and that the industry needs to stand united against them to make the digital world a safer place, guides the over 6000 employees every day. But she\u2019s also had a major impact on the industry at large, working tirelessly over the years to promote initiatives that have ultimately made our connected world more secure. It\u2019s not an exaggeration to say that without Eva\u2019s foresight and dedication, the cybersecurity industry would be a much poorer place.<\/p>\n<p>We\u2019re all looking forward to the event, and for the start of 2020. As we enter a new decade, Trend Micro\u2019s innovation and passion to make the digital world a safer place has never been more important.<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Effective collaboration is key to the success of any organization. But perhaps none more so than those working towards the common goal of securing our connected world. That\u2019s why Trend Micro has always been keen to reach out to industry partners in the security ecosystem, to help us collectively build a safer world and improve&#8230;<br \/>\nThe post Celebrating Decades of Success with Microsoft at the Security 20\/20 Awards appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32588,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[1089,1338,230,7046],"class_list":["post-32587","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-azure","tag-executive-insight","tag-microsoft","tag-partners"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Celebrating Decades of Success with Microsoft at the Security 20\/20 Awards 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Celebrating Decades of Success with Microsoft at the Security 20\/20 Awards 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-03T14:45:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"171\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Celebrating Decades of Success with Microsoft at the Security 20\\\/20 Awards\",\"datePublished\":\"2020-01-03T14:45:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\\\/\"},\"wordCount\":641,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards.jpg\",\"keywords\":[\"Azure\",\"Executive Insight\",\"Microsoft\",\"Partners\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\\\/\",\"name\":\"Celebrating Decades of Success with Microsoft at the Security 20\\\/20 Awards 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards.jpg\",\"datePublished\":\"2020-01-03T14:45:42+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards.jpg\",\"width\":300,\"height\":171},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azure\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/azure\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Celebrating Decades of Success with Microsoft at the Security 20\\\/20 Awards\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Celebrating Decades of Success with Microsoft at the Security 20\/20 Awards 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/","og_locale":"en_US","og_type":"article","og_title":"Celebrating Decades of Success with Microsoft at the Security 20\/20 Awards 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-03T14:45:42+00:00","og_image":[{"width":300,"height":171,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Celebrating Decades of Success with Microsoft at the Security 20\/20 Awards","datePublished":"2020-01-03T14:45:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/"},"wordCount":641,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards.jpg","keywords":["Azure","Executive Insight","Microsoft","Partners"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/","url":"https:\/\/www.threatshub.org\/blog\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/","name":"Celebrating Decades of Success with Microsoft at the Security 20\/20 Awards 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards.jpg","datePublished":"2020-01-03T14:45:42+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards.jpg","width":300,"height":171},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/celebrating-decades-of-success-with-microsoft-at-the-security-20-20-awards\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Azure","item":"https:\/\/www.threatshub.org\/blog\/tag\/azure\/"},{"@type":"ListItem","position":3,"name":"Celebrating Decades of Success with Microsoft at the Security 20\/20 Awards"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32587"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32587\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32588"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}