{"id":39833,"date":"2021-03-03T14:00:22","date_gmt":"2021-03-03T14:00:22","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=92891"},"modified":"2021-03-03T14:00:22","modified_gmt":"2021-03-03T14:00:22","slug":"compliance-joins-microsoft-intelligent-security-association-misa","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/","title":{"rendered":"Compliance joins Microsoft Intelligent Security Association (MISA)"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/SEC20_Security_021.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Like many of you, I\u2019m thrilled to have my 2020 calendar safely in the recycling pile. During that time though, you too might have noticed how, perhaps unknowingly, you were able to turn some of last year\u2019s lemons into lemonade. Maybe you developed a deeper appreciation for everyday moments and the people in your life, gaining a new perspective on what matters most.<\/p>\n<p>For my team, seeing the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/intelligent-security-association\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Intelligent Security Association (MISA)<\/a> grow to 190 partner companies has been a bright spot in a dark year. To date, MISA members have created 215 product integrations, and I\u2019m pleased to announce that our pilot program for adding managed security service providers (MSSPs) has formally transitioned. MISA now includes 39 MSSP members who have created 76 MSSP offers since the beginning of the fiscal year.<\/p>\n<blockquote>\n<p>\u201cMicrosoft Security integrates with a broad ecosystem of platforms and cloud providers, so they work with the things you already have in your environment; whether those things are from Microsoft, or not. Our partners are key to helping facilitate this integration.\u201d<em>\u2014<\/em>Vasu Jakkal, CVP, Security, Compliance and Identity<\/p>\n<\/blockquote>\n<blockquote>\n<p>\u201cAdding managed security service providers promises to increase the ecosystem\u2019s value even more by offering an extra layer of threat protection\u2014reducing the day-to-day involvement of in-house security teams. It\u2019s another important step in strengthening and simplifying security at a time when risk mitigation is one of IT\u2019s highest priorities.\u201d<em>\u2014<\/em>Shawn O\u2019Grady, Senior Vice President and General Manager, Cloud + Data Center Transformation at Insight<\/p>\n<\/blockquote>\n<p>Because Microsoft\u2019s footprint extends across many technologies, we have an advantage in creating holistic solutions that encompass the full breadth of security, compliance, and identity. In keeping with that end-to-end approach, we\u2019ve expanded MISA to include 5 new compliance products, growing the MISA product portfolio to 18.<\/p>\n<blockquote>\n<p>\u201cThe explosion of data from digital transformation and remote work make the integration of security and compliance tools across internal and external ecosystems more critical than ever. Together with the deep expertise of our MISA members, we can help our customers address their complex, evolving security and compliance needs.\u201d<em>\u2014<\/em>Alym Rayani, General Manager, Microsoft Compliance<\/p>\n<\/blockquote>\n<h2>Compliance comes to MISA<\/h2>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/trust-center\/compliance\/compliance-overview\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft compliance products<\/a> help our customers assess their compliance risk, protect their sensitive data, and govern it according to regulatory requirements. Through MISA, members get support in building managed services and integrations that:<\/p>\n<ol>\n<li>Protect and govern data wherever it lives.<\/li>\n<li>Identify and take actions on critical insider risks.<\/li>\n<li>Simplify compliance and reducing risk.<\/li>\n<li>Investigate and respond with relevant data.<\/li>\n<\/ol>\n<blockquote>\n<p>\u201cTeleMessage is excited to bring our Mobile Communication Archiving products to be a part of Microsoft\u2019s security solutions. Being a MISA member allows us to work closely with the Microsoft teams and allows us to provide seamless, secure, and compliant integrations delivering all popular forms of mobile communication.\u201d\u2014Guy Levit, CEO at TeleMessage<\/p>\n<\/blockquote>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/information-protection\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Information Protection<\/a> has been part of MISA since the association began in 2018, providing broad coverage across devices, apps, cloud services, and on-premises systems. This year, we\u2019re continuing to develop our holistic partner community across security, compliance, and identity by adding five additional Microsoft compliance products to our portfolio:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/enterprise\/data-protection\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Information Governance<\/a>: Keep what you need and delete what you don\u2019t. Apply compliance solutions and a deletion workflow for email, documents, instant messages, social media, document collaboration platforms, and more.<\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/data-loss-prevention-policies?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Data Loss Prevention<\/a>: Help users stay compliant without interrupting their workflow\u2014prevent the accidental sharing of sensitive information across Exchange Online, SharePoint Online, OneDrive for Business, Microsoft Teams, and desktop versions of Excel, PowerPoint, and Microsoft Word.<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/enterprise\/compliance-insider-risk-management\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft 365 Insider Risk Management<\/a>: Identify critical insider risks and take the appropriate action. With built-in privacy controls, use native and third-party signals to identify, investigate, and remediate malicious and inadvertent activities in your organization.<\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/overview-ediscovery-20?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Advanced eDiscovery<\/a>: Gain an end-to-end workflow to collect, analyze, preserve, and export content that\u2019s responsive to your organization\u2019s internal and external investigations. Identify persons of interest and their data sources, then manage the legal-hold communication process.<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/enterprise\/compliance-management\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Compliance Manager<\/a>: Get help throughout your compliance journey, from taking inventory of your data protection risks to managing the complexities of implementing controls, staying current with regulations and certifications, and reporting to auditors.<\/li>\n<\/ul>\n<blockquote>\n<p>\u201cJoining MISA enhances our relationship with Microsoft and our commitment to being an information governance and compliance leader providing solutions for organizations to bring third-party data into Microsoft 365 archive,\u201d said Charles Weeden, Managing Partner of 17a-4, LCC. \u201cDataParser\u2019s connectors will allow Microsoft 365 Compliance users to ingest content from various sources, such as Bloomberg, Slack, Symphony, Webex Teams and many others.\u201d<\/p>\n<\/blockquote>\n<h3>Connectors and APIs to extend compliance capabilities<\/h3>\n<p>Organizations today face an intimidating amount of data to protect across disparate systems, both on-premises and in the cloud. That\u2019s why Microsoft compliance solutions span information protection and governance, data-loss prevention, insider risk, eDiscovery, audit, and compliance management\u2014including your non-Microsoft data.<\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/microsoft-365-compliance-center?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft 365 compliance<\/a> enables organizations to extend, integrate, accelerate, and support their compliance solutions with three key building blocks:<\/p>\n<p>All of these new capabilities exist within Microsoft\u2019s integrated compliance platform. Meaning, customers only need to set compliance policies a single time, regardless of the data source.<\/p>\n<blockquote>\n<p>\u201cThe Veritas Merge1 connector platform integration with M365 allows our joint customers to configure, connect, and capture a vast number of data sources from within the M365 compliance center. The integration makes it easy to quickly identify which data sources need to be captured, to configure connectivity to those data sources and to pull data into M365 all from within the Azure infrastructure. Our development teams have worked closely together for over 12 months to make sure the workflow is simple and the capabilities are robust. With the increase in global regulations over the past several years, our goal is to simplify compliance, and we believe we have achieved that by working together with Microsoft.\u201d<em>\u2014<\/em>David Scott, Sr. Director, Digital Compliance at Veritas Technologies<\/p>\n<\/blockquote>\n<h3>Microsoft Security lights the way<\/h3>\n<p>As the global pandemic forced millions into remote work last year, hackers took advantage and upped their game, as seen with the recent <a href=\"https:\/\/msrc-blog.microsoft.com\/2020\/12\/21\/december-21st-2020-solorigate-resource-center\/\" target=\"_blank\" rel=\"noopener noreferrer\">Solorigate attack<\/a>. Many organizations saw their sensitive data created, viewed, and distributed across multiple fragmented platforms that increased the potential attack surface. Because we view security as part of the common good, we chose to take a proactive approach; shifting cybersecurity away from the shadows and into a place of innovation and empowerment.<\/p>\n<blockquote>\n<p>\u201cMISA has helped us promote successful integrations with Azure Security Graph API and Azure Active Directory, both now deeply embedded in Barracuda security solutions.\u201d<em>\u2014<\/em>Tim Jefferson, SVP Data, Networking, and Applications, Barracuda Networks<\/p>\n<\/blockquote>\n<p>During <a href=\"https:\/\/myignite.microsoft.com\/home\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Microsoft Ignite<\/strong><\/a><strong>, March 2-4, 2021<\/strong>, you\u2019ll see added investment in our security, compliance, and identity portfolio as we continue to innovate and create holistic solutions that support cultures of security for our customers and partners, based on four basic principles:<\/p>\n<ul>\n<li><strong>Protect everything<\/strong>: Safeguard your entire organization with integrated security, compliance, and identity solutions built to work across platforms and cloud environments.<\/li>\n<li><strong>Simplify the complex<\/strong>: Prioritize risks with unified management tools and strategic guidance created to maximize the human expertise inside your company.<\/li>\n<li><strong>Catch what others miss<\/strong>: Enable AI, automation, and human expertise to help you detect threats quickly, respond effectively, and fortify your security posture.<\/li>\n<li><strong>Grow your future<\/strong>: Gain the peace of mind that comes with a comprehensive security solution, empowering you to grow, create, and innovate across your business.<\/li>\n<\/ul>\n<p>To learn more about upcoming big announcements at Microsoft Ignite this week, visit our latest blog posts:<\/p>\n<p>To learn more about Microsoft Security solutions, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">visit our website<\/a>.&nbsp; Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/03\/compliance-joins-microsoft-intelligent-security-association-misa\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Like many of you, I\u2019m thrilled to have my 2020 calendar safely in the recycling pile. During that time though, you too might have noticed how, perhaps unknowingly, you were able to turn some of last year\u2019s lemons into lemonade. Maybe you developed a deeper appreciation for everyday moments and the people in your life,&#8230;<br \/>\nThe post Compliance joins Microsoft Intelligent Security Association (MISA) appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39834,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,7582,8630],"class_list":["post-39833","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-microsoft-intelligent-security-association-misa","tag-misa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Compliance joins Microsoft Intelligent Security Association (MISA) 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compliance joins Microsoft Intelligent Security Association (MISA) 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-03T14:00:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/compliance-joins-microsoft-intelligent-security-association-misa.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Compliance joins Microsoft Intelligent Security Association (MISA)\",\"datePublished\":\"2021-03-03T14:00:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/\"},\"wordCount\":1288,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/compliance-joins-microsoft-intelligent-security-association-misa.jpg\",\"keywords\":[\"Cybersecurity\",\"Microsoft Intelligent Security Association (MISA)\",\"MISA\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/\",\"name\":\"Compliance joins Microsoft Intelligent Security Association (MISA) 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/compliance-joins-microsoft-intelligent-security-association-misa.jpg\",\"datePublished\":\"2021-03-03T14:00:22+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/compliance-joins-microsoft-intelligent-security-association-misa.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/compliance-joins-microsoft-intelligent-security-association-misa.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Compliance joins Microsoft Intelligent Security Association (MISA)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Compliance joins Microsoft Intelligent Security Association (MISA) 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/","og_locale":"en_US","og_type":"article","og_title":"Compliance joins Microsoft Intelligent Security Association (MISA) 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-03-03T14:00:22+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/compliance-joins-microsoft-intelligent-security-association-misa.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Compliance joins Microsoft Intelligent Security Association (MISA)","datePublished":"2021-03-03T14:00:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/"},"wordCount":1288,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/compliance-joins-microsoft-intelligent-security-association-misa.jpg","keywords":["Cybersecurity","Microsoft Intelligent Security Association (MISA)","MISA"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/","url":"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/","name":"Compliance joins Microsoft Intelligent Security Association (MISA) 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/compliance-joins-microsoft-intelligent-security-association-misa.jpg","datePublished":"2021-03-03T14:00:22+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/compliance-joins-microsoft-intelligent-security-association-misa.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/compliance-joins-microsoft-intelligent-security-association-misa.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/compliance-joins-microsoft-intelligent-security-association-misa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Compliance joins Microsoft Intelligent Security Association (MISA)"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39833"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39833\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39834"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}