{"id":32804,"date":"2020-01-16T18:00:28","date_gmt":"2020-01-16T18:00:28","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=90465"},"modified":"2020-01-16T18:00:28","modified_gmt":"2020-01-16T18:00:28","slug":"changing-the-monolith-part-2-whose-support-do-you-need","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/","title":{"rendered":"Changing the monolith\u2014Part 2: Whose support do you need?"},"content":{"rendered":"<p>In <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/01\/09\/changing-the-monolith-part-1-building-alliances-for-a-secure-culture\/\" target=\"_blank\" rel=\"noopener noreferrer\">Changing the monolith\u2014Part 1: Building alliances for a secure culture<\/a>, I explored how security leaders can build alliances and why a commitment to change must be signaled from the top. But whose support should you recruit in the first place? In Part 2, I address considerations for the cybersecurity team itself, the organization\u2019s business leaders, and the employees whose buy-in is critical.<\/p>\n<h3>Build the right cybersecurity team<\/h3>\n<p>It could be debated that the concept of a \u201cdeep generalist\u201d is an oxymoron. The analogy I frequently find myself making is you would never ask a dermatologist to perform a hip replacement. A hip replacement is best left to an orthopedic surgeon who has many hours of hands-on experience performing hip replacements. This does not lessen the importance of the dermatologist, who can quickly identify and treat potentially lethal diseases such as skin cancer.<\/p>\n<p>Similarly, not every cybersecurity and privacy professional is deep in all subjects such as <a href=\"https:\/\/medium.com\/microsoft-cybersecurity\/governing-the-modern-cyber-security-landscape-5c787b50d2ff\" target=\"_blank\" rel=\"noopener noreferrer\">governance<\/a>, technology, law, organizational dynamics, and <a href=\"https:\/\/medium.com\/microsoft-cybersecurity\/humans-of-cybersecurity-the-future-is-a-boardroom-with-more-security-aware-business-eafbe504c54\" target=\"_blank\" rel=\"noopener noreferrer\">emotional intelligence<\/a>. No person is born a specialist.<\/p>\n<p>If you are looking for someone who is excellent at threat prevention, detection, and incident response, <strong>hire someone who specializes in those specific tasks and has demonstrated experience and competency<\/strong>. Likewise, be cautious of promoting cybersecurity architects to the role of <a href=\"https:\/\/medium.com\/microsoft-cybersecurity\/in-defense-of-the-chief-information-scapegoat-officer-9c2b4d8b234\" target=\"_blank\" rel=\"noopener noreferrer\">Chief Information Security Officer (CISO)<\/a> if they have not demonstrated strategic leadership with the social aptitude to connect with other senior leaders in the organization. <a href=\"https:\/\/medium.com\/microsoft-cybersecurity\/what-we-lose-without-a-vision-1a08238dadb8\" target=\"_blank\" rel=\"noopener noreferrer\">CISOs, after all, are not technology champions as much as they are business leaders<\/a>.<\/p>\n<h3>Keep business leaders in the conversation<\/h3>\n<p>Leaders can enhance their organizations\u2019 security stance by sending a top-down message across all business units that \u201csecurity begins with me.\u201d One way to send this message is to <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/01\/31\/ciso-series-talking-cybersecurity-with-the-board-of-directors\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>regularly brief the executive team and the board on cybersecurity and privacy risks<\/strong><\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-Monolith-Part-2-1.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-90467 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-Monolith-Part-2-1.png\" alt=\"Image of three coworkers working at a desk in an office.\" width=\"2000\" height=\"1333\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-Monolith-Part-2-1.png 2000w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-Monolith-Part-2-1-300x200.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-Monolith-Part-2-1-768x512.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-Monolith-Part-2-1-1024x682.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/01\/Changing-the-Monolith-Part-2-1-293x195.png 293w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\"><\/a><\/p>\n<p><em>Keep business leaders accountable about security.<\/em><\/p>\n<p>These should not be product status reports, but briefings on key performance indicators (KPI) of risk. Business leaders must inform what the organization considers to be its top risks.<\/p>\n<p>Here are three ways to guide these conversations:<\/p>\n<ol>\n<li><strong>Evaluate the existing cyber-incident response plan within the context of the overall organization\u2019s business continuity plan.<\/strong> Elevate cyber-incident response plans to account for major outages, severe weather, civil unrest, and epidemics\u2014which all place similar, if not identical, stresses to the business. Ask leadership what they believe the \u201ccrown jewels\u201d to be, so you can <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/05\/09\/safeguard-sensitive-data-microsoft-365\/\" target=\"_blank\" rel=\"noopener noreferrer\">prioritize your approach to data protection<\/a>. The team responsible for identifying the \u201ccrown jewels\u201d should include senior management from the lines of businesses and administrative functions.<\/li>\n<li><strong>Review the cybersecurity budget with a business case and a strategy in mind.<\/strong> Many times, security budgets take a backseat to other IT or business priorities, resulting in companies being unprepared to deal with risks and attacks. An annual review of cybersecurity budgets tied to what looks like a \u201cgood fit\u201d for the organization is recommended.<\/li>\n<li><strong>Reevaluate cyber insurance on an annual basis and revisit its use and requirements for the organization.<\/strong> Ensure that it\u2019s effective against attacks that could be considered <em>\u201cacts of war,\u201d<\/em> which might otherwise not be covered by the organization\u2019s policy. Review your policy and ask: What happens if the threat actor was a nation state aiming for another nation state, placing your organization in the crossfire?<\/li>\n<\/ol>\n<h3>Gain buy-in through a frictionless user experience<\/h3>\n<p>\u201c<a href=\"https:\/\/info.microsoft.com\/Shadow-IT-Webinar.html\" target=\"_blank\" rel=\"noopener noreferrer\">Shadow IT<\/a>\u201d is a persistent problem <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/04\/15\/discover-manage-shadow-it-with-microsoft-365\/\" target=\"_blank\" rel=\"noopener noreferrer\">when there is no sanctioned way for users to collaborate with the outside world<\/a>. Similarly, users save and hoard emails when, in response to an overly zealous data retention policy, their emails are deleted after 30 days.<\/p>\n<p>Digital transformation introduces a sea of change in how cybersecurity is implemented. It\u2019s paramount to provide the user with the most <em>frictionless user experience<\/em> available, adopting <em>mobile-first, cloud-first philosophies<\/em>.<\/p>\n<p>Ignoring the user experience in your change implementation plan will only lead users to identify clever ways to circumvent frustrating security controls. <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/05\/09\/safeguard-sensitive-data-microsoft-365\/\" target=\"_blank\" rel=\"noopener noreferrer\">Look for ways to prioritize the user experience even while meeting security and compliance goals<\/a>.<\/p>\n<h3>Incremental change versus tearing off the band-aid<\/h3>\n<p>Imagine slowly replacing the interior and exterior components of your existing vehicle one by one until you have a \u201cnew\u201d car. It doesn\u2019t make sense: You still have to drive the car, even while the replacements are being performed!<\/p>\n<p>Similarly, I\u2019ve seen organizations take this approach in implementing change, attempting to create a modern workplace over a long period of time. However, this draws out complex, multi-platform headaches for months and years, leading to user confusion, loss of confidence in IT, and lost productivity. You wouldn\u2019t \u201cpurchase\u201d a new car this way; why take this approach for your organization?<\/p>\n<p>Rather than mixing old parts with new parts, you would save money, shop time, and operational (and emotional) complexity by simply trading in your old car for a new one.<\/p>\n<p>Fewer organizations take this alternative approach of \u201ctearing off the band-aid.\u201d If the user experience is frictionless, more efficient, and enhances the ease of data protection, an organization\u2019s highly motivated employee base will adapt much more easily.<\/p>\n<h3>Stayed tuned and stay updated<\/h3>\n<p>Stay tuned for more! In my next installments, I will cover the topics of process and technology, respectively, and their role in changing the security monolith. Technology on its own solves nothing. What good are building supplies and tools without a blueprint? Similarly, process is the orchestration of the effort, and is necessary to enhance an organization\u2019s cybersecurity, privacy, compliance, and productivity.<\/p>\n<p>In the meantime, bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/01\/16\/changing-the-monolith-part-2-whose-support-do-you-need\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Transformation can be a daunting task. In this series, I explore how change is possible when addressing the components of people, process, and technology that make up the organization.<br \/>\nThe post Changing the monolith\u2014Part 2: Whose support do you need? appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32805,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[941,347],"class_list":["post-32804","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-compliance","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Changing the monolith\u2014Part 2: Whose support do you need? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Changing the monolith\u2014Part 2: Whose support do you need? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-16T18:00:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-2-whose-support-do-you-need-1024x682.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"682\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Changing the monolith\u2014Part 2: Whose support do you need?\",\"datePublished\":\"2020-01-16T18:00:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/\"},\"wordCount\":954,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-2-whose-support-do-you-need.png\",\"keywords\":[\"compliance\",\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/\",\"name\":\"Changing the monolith\u2014Part 2: Whose support do you need? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-2-whose-support-do-you-need.png\",\"datePublished\":\"2020-01-16T18:00:28+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-2-whose-support-do-you-need.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-2-whose-support-do-you-need.png\",\"width\":2000,\"height\":1333},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"compliance\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/compliance\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Changing the monolith\u2014Part 2: Whose support do you need?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Changing the monolith\u2014Part 2: Whose support do you need? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/","og_locale":"en_US","og_type":"article","og_title":"Changing the monolith\u2014Part 2: Whose support do you need? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-16T18:00:28+00:00","og_image":[{"width":1024,"height":682,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-2-whose-support-do-you-need-1024x682.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Changing the monolith\u2014Part 2: Whose support do you need?","datePublished":"2020-01-16T18:00:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/"},"wordCount":954,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-2-whose-support-do-you-need.png","keywords":["compliance","Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/","url":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/","name":"Changing the monolith\u2014Part 2: Whose support do you need? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-2-whose-support-do-you-need.png","datePublished":"2020-01-16T18:00:28+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-2-whose-support-do-you-need.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/changing-the-monolith-part-2-whose-support-do-you-need.png","width":2000,"height":1333},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/changing-the-monolith-part-2-whose-support-do-you-need\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"compliance","item":"https:\/\/www.threatshub.org\/blog\/tag\/compliance\/"},{"@type":"ListItem","position":3,"name":"Changing the monolith\u2014Part 2: Whose support do you need?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32804"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32804\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32805"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}