{"id":37660,"date":"2020-10-14T16:00:50","date_gmt":"2020-10-14T16:00:50","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=92079"},"modified":"2020-10-14T16:00:50","modified_gmt":"2020-10-14T16:00:50","slug":"security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/","title":{"rendered":"Security Unlocked\u2014A new podcast exploring the people and AI that power Microsoft Security solutions"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/10\/SUR18_Holiday_Contextual_3428_RGB.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>It\u2019s hard to keep pace with all the changes happening in the world of cybersecurity. Security experts and leaders must continue learning (and unlearning) to stay ahead of the ever-evolving threat landscape. In fact, many of us are in this field <em>because of <\/em>our desire to continuously challenge ourselves and serve the greater good.<\/p>\n<p>So many of the advancements in security are now utilizing this amorphous, at times controversial, and complex term called \u201cartificial intelligence\u201d (AI). Neural networks, clustering, fuzzy logic, heuristics, deep learning, random forests, adversarial machine learning (ML), unsupervised learning. These are just a few of the concepts that are being actively researched and utilized in security today.<\/p>\n<p>But what do these techniques do? How do they work? What are the benefits? As security professionals, we know you have these questions, and so we decided to create <a href=\"https:\/\/securityunlockedpodcast.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security Unlocked<\/a>, a new podcast launching today, to help unlock (<em>we promise not to overuse this pun<\/em>) insights into these new technologies and the people creating them.<\/p>\n<p>In each episode, hosts Nic Fillingham and Natalia Godyla take a closer look at the latest in threat intelligence, security research, and data science. Our expert guests share insights into how modern security technologies are being built, how threats are evolving, and how machine learning and artificial intelligence are being used to secure the world.<\/p>\n<p>Each episode will also feature an interview with one of the many experts working in Microsoft Security. Guests will share their unique path to Microsoft and the infosec field, what they love about their calling and their predictions about the future of ML and AI.<\/p>\n<p>New episodes of Security Unlocked will be released twice a month with the first three episodes available today on all major podcast platforms. We will talk about specific topics in future blogs and provide links to podcasts to get more in-depth.<\/p>\n<h3>Episode 1: Going \u2018deep\u2019 to identify attacks, and Holly Stewart<\/h3>\n<p><a href=\"https:\/\/aka.ms\/SecurityUnlockedEp01\">Listen here<\/a>.<\/p>\n<p><strong>Guests<\/strong>: Arie Agranonik and Holly Stewart<\/p>\n<p><strong>Blog referenced<\/strong>: <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/07\/23\/seeing-the-big-picture-deep-learning-based-fusion-of-behavior-signals-for-threat-detection\/\" target=\"_blank\" rel=\"noopener noreferrer\">Seeing the big picture: Deep learning-based fusion of behavior signals for threat detection<\/a><\/p>\n<p>In this episode, Nic and Natalia invited Arie Agranonik, Senior Data Scientist at Microsoft, to better understand how we\u2019re using deep learning models to look at behavioral signals and identify malicious process trees. In their chat, Arie explains the differences and use cases for techniques such as deep learning, neural networks, and transfer learning.<\/p>\n<p>Nic and Natalia also speak with Holly Stewart, Principal Research Manager at Microsoft, to learn how, and when, to use machine learning, best practices for building an awesome security research team, and the power of diversity in security.<\/p>\n<h3>Episode 2: Unmasking threats with AMSI and ML, and Dr. Josh Neil<\/h3>\n<p><a href=\"https:\/\/aka.ms\/SecurityUnlockedEp02\" target=\"_blank\" rel=\"noopener noreferrer\">Listen here<\/a>.<\/p>\n<p><strong>Guests<\/strong>: Ankit Garg, Geoff McDonald, and Dr. Josh Neil<\/p>\n<p><strong>Blog referenced<\/strong>: <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/08\/27\/stopping-active-directory-attacks-and-other-post-exploitation-behavior-with-amsi-and-machine-learning\/\" target=\"_blank\" rel=\"noopener noreferrer\">Stopping Active Directory attacks and other post-exploitation behavior with AMSI and machine learning<\/a><\/p>\n<p>In this episode, members of the Microsoft Defender ATP Research team chat about how the antimalware scripting interface (AMSI) and machine learning are stopping active directory attacks.<\/p>\n<p>They\u2019re also joined by Josh Neil, Principal Data Science Manager at Microsoft, as he discusses his path from music to mathematics, one definition of \u201cartificial intelligence,\u201d and the importance of combining multiple weak signals to gain a comprehensive view of an attack.<\/p>\n<h3>Episode 3: Behavior-based protection for the under-secured, and Dr. Karen Lavi<\/h3>\n<p><a href=\"https:\/\/aka.ms\/SecurityUnlockedEp03\" target=\"_blank\" rel=\"noopener noreferrer\">Listen here<\/a>.<\/p>\n<p><strong>Guests<\/strong>: Hardik Suri and Dr. Karen Lavi<\/p>\n<p><strong>Blog referenced<\/strong>: <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/06\/24\/defending-exchange-servers-under-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">Defending Exchange servers under attack<\/a><\/p>\n<p>In this episode, Nic and Natalia chat with Hardik Suri on the importance of keeping servers up-to-date and how behavior-based monitoring is helping protect under-secured Exchange servers.<\/p>\n<p>Dr. Karen Lavi, Senior Data Scientist Lead at Microsoft, joins the discussion to talk about commonalities between neuroscience and cybersecurity, her unique path to Microsoft (Teaser: She started in the Israeli Defense Force and later got her PhD in neuroscience), and her predictions on the future of AI.<\/p>\n<p>Please join us monthly on the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Security Blog<\/a> for new episodes. If you have feedback on how we can improve the podcast or suggestions for topics to cover in future episodes, please email us at <a href=\"mailto:securityunlocked@microsoft.com\" target=\"_blank\" rel=\"noopener noreferrer\">securityunlocked@microsoft.com<\/a>, or talk to us on our <a href=\"https:\/\/twitter.com\/msftsecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a> Twitter handle.<\/p>\n<p>And don\u2019t forget to subscribe to <a href=\"https:\/\/securityunlockedpodcast.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security Unlocked<\/a>.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/10\/14\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s hard to keep pace with all the changes happening in the world of cybersecurity. Security experts and leaders must continue learning (and unlearning) to stay ahead of the ever-evolving threat landscape. In fact, many of us are in this field because of our desire to continuously challenge ourselves and serve the greater good. So&#8230;<br \/>\nThe post Security Unlocked\u2014A new podcast exploring the people and AI that power Microsoft Security solutions appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37661,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,307],"class_list":["post-37660","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Unlocked\u2014A new podcast exploring the people and AI that power Microsoft Security solutions 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Unlocked\u2014A new podcast exploring the people and AI that power Microsoft Security solutions 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-14T16:00:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Security Unlocked\u2014A new podcast exploring the people and AI that power Microsoft Security solutions\",\"datePublished\":\"2020-10-14T16:00:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/\"},\"wordCount\":716,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions.jpg\",\"keywords\":[\"Cybersecurity\",\"Security\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/\",\"name\":\"Security Unlocked\u2014A new podcast exploring the people and AI that power Microsoft Security solutions 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions.jpg\",\"datePublished\":\"2020-10-14T16:00:50+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions.jpg\",\"width\":1080,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security Unlocked\u2014A new podcast exploring the people and AI that power Microsoft Security solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Unlocked\u2014A new podcast exploring the people and AI that power Microsoft Security solutions 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Security Unlocked\u2014A new podcast exploring the people and AI that power Microsoft Security solutions 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-10-14T16:00:50+00:00","og_image":[{"width":1080,"height":720,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Security Unlocked\u2014A new podcast exploring the people and AI that power Microsoft Security solutions","datePublished":"2020-10-14T16:00:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/"},"wordCount":716,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions.jpg","keywords":["Cybersecurity","Security"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/","url":"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/","name":"Security Unlocked\u2014A new podcast exploring the people and AI that power Microsoft Security solutions 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions.jpg","datePublished":"2020-10-14T16:00:50+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions.jpg","width":1080,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/security-unlocked-a-new-podcast-exploring-the-people-and-ai-that-power-microsoft-security-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Security Unlocked\u2014A new podcast exploring the people and AI that power Microsoft Security solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37660"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37660\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37661"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}