{"id":32693,"date":"2020-01-09T17:00:23","date_gmt":"2020-01-09T17:00:23","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=90427"},"modified":"2020-01-09T17:00:23","modified_gmt":"2020-01-09T17:00:23","slug":"changing-the-monolith-part-1-building-alliances-for-a-secure-culture","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/","title":{"rendered":"Changing the monolith\u2014Part 1: Building alliances for a secure culture"},"content":{"rendered":"<p>Any modern security expert can tell you that we\u2019re light years away from the old days when firewalls and antivirus were the only mechanisms of protection against cyberattacks. Cybersecurity has been one of the hot topics of boardroom conversation for the last eight years, and has been rapidly increasing to higher priority due to the size and frequency of data breaches that have been reported across all industries and organizations.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/01\/31\/ciso-series-talking-cybersecurity-with-the-board-of-directors\/\" target=\"_blank\" rel=\"noopener noreferrer\">The security conversation has finally been elevated out of the shadows of the IT Department and has moved into the executive and board level spotlights<\/a>. This has motivated the C-teams of organizations everywhere to start asking hard questions of their Chief Information Officers, Chief Compliance Officers, Privacy Officers, Risk Organizations, and Legal Counsels.<\/p>\n<p>Cybersecurity professionals can either wait until these questions land at their feet, or they can take charge and build relationships with executives and the business side of the organization.<\/p>\n<h3>Taking charge of the issue<\/h3>\n<p>Professionals fortunate enough to have direct access to the Board of Directors of their organization can also build <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/04\/10\/4-prevention-strategies-enterprise-level-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">extremely valuable relationships at the board level as well<\/a>. As cybersecurity professionals establish lines of communication throughout organizational leadership, they must keep in mind that <strong>these leaders, although experts in their respective areas, are not technologists<\/strong>.<\/p>\n<p><a href=\"https:\/\/medium.com\/microsoft-cybersecurity\/humans-of-cybersecurity-the-future-is-a-boardroom-with-more-security-aware-business-eafbe504c54\" target=\"_blank\" rel=\"noopener noreferrer\">The challenge that cybersecurity professionals face is being able to get the non-technical people on board with the culture of change in regards to security<\/a>. These kinds of changes in culture and thinking can help facilitate the innovation that is needed to decrease the risk of compromise, reputation damage, sanctions against the organization, and potential stock devaluation. So how can one deliver this message of <em>Fear<\/em>, <em>Uncertainty<\/em>, <em>and Doubt (FUD)<\/em> without losing the executive leaders in the technical details or dramatization of the current situation?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90428\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-monolith-1.jpg\" alt width=\"2000\" height=\"1335\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-monolith-1.jpg 2000w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-monolith-1-300x200.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-monolith-1-768x513.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-monolith-1-1024x684.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-monolith-1-293x195.jpg 293w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\"><\/p>\n<p><em>Start by addressing the business problem, not the technology.<\/em><\/p>\n<h3>The answer isn\u2019t as daunting as you might think<\/h3>\n<p>The best way to start the conversation with business leaders is to begin by <a href=\"https:\/\/medium.com\/microsoft-cybersecurity\/what-we-lose-without-a-vision-1a08238dadb8\" target=\"_blank\" rel=\"noopener noreferrer\">stating the principles of your approach to addressing the problem and the risks of not properly addressing it<\/a>. It\u2019s important to remember to present the principles and methods in a way that is understandable to non-technical persons.<\/p>\n<p>This may sound challenging at first, but the following examples will give you a good starting point of how to accomplish this:<\/p>\n<ul>\n<li><strong>At some point in time, there<\/strong> <em><strong>will<\/strong><\/em> <strong>be a data breach<\/strong>\u2014Every day we\u2019re up against tens of thousands of \u201cmilitarized\u201d state-sponsored threat actors who usually know more about organizations and technical infrastructure than we do. This is not a fight we\u2019ll always win, even if we\u2019re able to bring near unlimited resources to the table, which is often rare itself. In any scenario, we must accept some modicum of risk, and cybersecurity is no different. The approach for resolution should involve mitigating the likelihood and severity of a compromise situation when it ultimately does occur.<\/li>\n<li><strong>Physical security and cybersecurity are linked<\/strong>\u2014If you have access to physical hardware, there are a myriad of ways to pull data directly from your enterprise network and send it to a dark web repository or other malicious data repository for later decryption and analysis. If you have possession of a laptop or mobile device, and storage encryption hasn\u2019t been implemented, an attacker can forensically image the device fairly easily and make an exact replica to analyze later. By using these or similar examples, you can clearly state that physical security even <em>equals<\/em> cybersecurity in many cases.<\/li>\n<li><strong>You can\u2019t always put a dollar amount on digital trust<\/strong>\u2014Collateral damage in the aftermath of a cyberattack go well beyond dollars and paying attention to cybersecurity and privacy threats demonstrate digital trust to clients, customers, employees, suppliers, vendors, and the general public. <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2019\/04\/29\/microsoft-releases-biannual-digital-trust-reports-4\/\" target=\"_blank\" rel=\"noopener noreferrer\">Digital trust underpins every digital interaction by measuring and quantifying the expectation that an entity is who or what it claims to be and that it will behave in an expected manner<\/a>. This can set an organization apart from its competitors.<\/li>\n<li><strong>Everything can\u2019t be protected equally; likewise, everything doesn\u2019t have the same business value<\/strong>\u2014Where are the crown jewels and what systems\u2019 failure would create a critical impact on the organizations business? Once identified, the organization has a lot less to worry about and protect. Additionally, one of the core principles should be, \u201cWhen in doubt, throw it out.\u201d Keeping data longer than it needs to be kept increases the attack surface area and creates liability for the firm to produce large amounts of data during requests for legal discovery. The Data Retention Policy needs to reflect this. Data Retention Policies need to be created with input from the business and General Counsel.<\/li>\n<li><strong>Identity is the new perimeter<\/strong>\u2014Additional perimeter-based security appliances will not decrease the chance of compromise. Once identity is compromised, perimeter controls become useless. Operate as if the organization\u2019s network has already been compromised as mentioned in principle #1. <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2018\/12\/17\/zero-trust-part-1-identity-and-access-management\/\" target=\"_blank\" rel=\"noopener noreferrer\">Focus the investment on modern authentication, Zero Trust, conditional access, and abnormal user and information behavior detection<\/a>. Questions to ask now include, what\u2019s happening to users, company data, and devices both inside and outside the firewall. Think about data handling\u2014who has access to what and why and is it within normal business activity parameters?<\/li>\n<\/ul>\n<h3>The culture of change in the organization<\/h3>\n<p>If leadership is not on board with the people, process, and technology changes required to fulfill a modern approach to cybersecurity and data protection, any effort put into such a program is a waste of time and money.<\/p>\n<p>You can tell immediately if you\u2019ve done the appropriate amount of marketing to bring cybersecurity and data protection to the forefront of business leaders\u2019 agendas. If the funding and the support for the mission is unavailable, one must ask oneself if the patient, in this case the organization, truly wants to get better.<\/p>\n<p>If, during a company meeting, a CEO declares that \u201cdata protection is everyone\u2019s responsibility, including mine,\u201d everyone will recognize the importance of the initiative to the company\u2019s success. Hearing this from the CISO or below does not have the same gravitas.<\/p>\n<p>The most successful programs I\u2019ve seen are those who have been sponsored at the <strong>highest levels of the organization and tied to performance<\/strong>. For more information on presenting to the board of directors, watch our <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/ciso-cybersecurity-strategy?rtc=1\" target=\"_blank\" rel=\"noopener noreferrer\">CISO Spotlight Episode with Bret Arsenault, Microsoft CISO<\/a>.<\/p>\n<h3>Stayed tuned and stay updated<\/h3>\n<p>Stay tuned for \u201cChanging the monolith\u2014Part 2\u201d where I address who you should recruit as you build alliances across the organization, how to build support through business conversations, and what\u2019s next in driving organizational change. In the meantime, bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at <a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/01\/09\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people, process, and technology that make up the organization.<br \/>\nThe post Changing the monolith\u2014Part 1: Building alliances for a secure culture appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32694,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347],"class_list":["post-32693","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Changing the monolith\u2014Part 1: Building alliances for a secure culture 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Changing the monolith\u2014Part 1: Building alliances for a secure culture 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-09T17:00:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1335\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Changing the monolith\u2014Part 1: Building alliances for a secure culture\",\"datePublished\":\"2020-01-09T17:00:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\\\/\"},\"wordCount\":1151,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\\\/\",\"name\":\"Changing the monolith\u2014Part 1: Building alliances for a secure culture 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture.jpg\",\"datePublished\":\"2020-01-09T17:00:23+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture.jpg\",\"width\":2000,\"height\":1335},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Changing the monolith\u2014Part 1: Building alliances for a secure culture\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Changing the monolith\u2014Part 1: Building alliances for a secure culture 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/","og_locale":"en_US","og_type":"article","og_title":"Changing the monolith\u2014Part 1: Building alliances for a secure culture 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-09T17:00:23+00:00","og_image":[{"width":2000,"height":1335,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Changing the monolith\u2014Part 1: Building alliances for a secure culture","datePublished":"2020-01-09T17:00:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/"},"wordCount":1151,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture.jpg","keywords":["Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/","url":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/","name":"Changing the monolith\u2014Part 1: Building alliances for a secure culture 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture.jpg","datePublished":"2020-01-09T17:00:23+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture.jpg","width":2000,"height":1335},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Changing the monolith\u2014Part 1: Building alliances for a secure culture"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32693"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32693\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32694"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}