{"id":51113,"date":"2023-03-21T16:00:00","date_gmt":"2023-03-21T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=126477"},"modified":"2023-03-21T16:00:00","modified_gmt":"2023-03-21T16:00:00","slug":"gain-real-time-identity-protection-with-microsoft-and-recorded-future","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/","title":{"rendered":"Gain real-time identity protection with Microsoft and Recorded Future"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/CLO22_Cafe_005-1-1.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><em>This blog post is part of the Microsoft Intelligent Security Association&nbsp;<\/em><a href=\"https:\/\/aka.ms\/MISAguestblog\"><em>guest blog series<\/em><\/a><em>.&nbsp;<\/em><a href=\"https:\/\/aka.ms\/MISA\"><em>Learn more about MISA<\/em><\/a><em>.<\/em>&nbsp;<\/p>\n<p>You\u2019ve implemented multifactor authentication for access to your enterprise network. But what if multifactor authentication isn\u2019t as foolproof as you\u2019re hoping?<\/p>\n<p>Are you comfortable betting your organization\u2019s security on it?<\/p>\n<h2>Multifactor authentication isn\u2019t a silver bullet<\/h2>\n<p>The premise behind <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/azure-active-directory-mfa-multi-factor-authentication\">multifactor authentication<\/a> is a good one\u2014anybody who wants to access your network needs two or more things:<\/p>\n<ol type=\"1\">\n<li>Something they know (such as a password or personal identification number).<\/li>\n<li>Something they have in their possession (cryptographic identification device, token).<\/li>\n<li>Something they are (biometric, fingerprint).<\/li>\n<\/ol>\n<p>Users enter two of those (or three of them, to access especially sensitive resources), your server authenticates them, and they\u2019re on your network. It\u2019s more robust security than a simple username and password, and it makes bad actors work a lot harder to access your network.<\/p>\n<p>That\u2019s why multifactor authentication is such a commonly used approach in security for solving the problem of leaked or compromised credentials. But it\u2019s not foolproof, and here\u2019s why Recorded Future thinks you can do better.<\/p>\n<h2>SMS is vulnerable<\/h2>\n<p>Many multifactor authentication products, especially the ones suitable for consumer use, rely on SMS and send a code to the user\u2019s phone in a text message. Unfortunately, <a href=\"https:\/\/go.recordedfuture.com\/hubfs\/solution-briefs\/zero-trust.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">SMS can be hacked or spoofed<\/a>, with the result that the bad actor receives the code and is able to pass the authentication test.<\/p>\n<p>Also, not all applications support multifactor authentication\u2014that\u2019s especially true of older systems\u2014which leaves the door open to bad actors. There are passwordless authentication methods, but credentials are used to authenticate the system on the back end, so password security and the user\u2019s identity can still be avenues for compromise.<\/p>\n<h2>Multifactor authentication isn\u2019t enough<\/h2>\n<p>Threat actors can brute force their way into accounts, defeat multifactor authentication, and breach organizations. There are many ways, unfortunately, that threat actors can accomplish this.<\/p>\n<p>One way is by <a href=\"https:\/\/www.recordedfuture.com\/session-hijacking-mfa-bypass\" target=\"_blank\" rel=\"noreferrer noopener\">hijacking session cookies<\/a>. Another way involves exploiting default multifactor authentication protocols. For instance, the <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-074a\" target=\"_blank\" rel=\"noreferrer noopener\">United States Cybersecurity and Infrastructure Security Agency<\/a> recently released a report warning that Russian state-sponsored threat actors were able to gain network access by taking advantage of an account set to default multifactor authentication protocols. That allowed them to enroll a new device for multifactor authentication access in their victim\u2019s network, and then take advantage of a critical Windows vulnerability to run any code they wanted on the hacked network\u2014with system privileges. One small mistake with multifactor authentication enabled threat actors to gain not only access but also significant control over the network.<\/p>\n<h2>Beyond multifactor authentication: Identity Intelligence from Recorded Future<\/h2>\n<p>Of course, threat actors are trying to breach thousands of networks every day. Suppose you had up-to-date intelligence that told you about their attempts all over the globe. That would give you a lot more information about them than just their IP address. Wouldn\u2019t that help you decide whether their visit to your site was legitimate or not?<\/p>\n<p>That\u2019s the <a href=\"https:\/\/www.recordedfuture.com\/best-practices-robust-identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">identity management<\/a> model Recorded Future uses with <a href=\"https:\/\/www.recordedfuture.com\/platform\/identity-intelligence\" target=\"_blank\" rel=\"noreferrer noopener\">Identity Intelligence<\/a>. It arms security teams with real-time information about identity compromises worldwide so they can respond confidently, without any manual research. Identity Intelligence automates the collection, analysis, and production of intelligence from open-source, dark-web, and technology entities, including unique sourcing of <a href=\"https:\/\/go.recordedfuture.com\/hubfs\/data-sheets\/malware-logs.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">malware log<\/a> information. It combines that intelligence with world-class research to deliver an unmatched source of truth for identity management and authentication at a massive scale.<\/p>\n<p>Identity Intelligence covers the most prominent use cases that enterprises face in a landscape of employees, partners, supply chains, and customers in an era of account takeovers and identity fraud:<\/p>\n<ul>\n<li>Preventing business email compromise and account hijacking.<\/li>\n<li>Identifying and mitigating the risk of account takeover.<\/li>\n<li>Checking for risk automatically during critical events (such as password creation or reset).<\/li>\n<li>Monitoring employee and customer identities on an ongoing basis.<\/li>\n<\/ul>\n<p>It represents an important tool for securing user identity, as remote work and digital interactions across multiple channels increase the responsibilities of security and IT teams.<\/p>\n<h2>Integration with Microsoft<\/h2>\n<p>Recorded Future has released an integration between <a href=\"https:\/\/www.recordedfuture.com\/integrations\/azure-active-directory\" target=\"_blank\" rel=\"noreferrer noopener\">Identity Intelligence and Microsoft Azure Active Directory<\/a>. The integration monitors new, compromised credentials found by Recorded Future, and places at-risk users into one or more different security groups, based on the client\u2019s security policies and the nature of the compromise.&nbsp; For example, credentials from bulk data dumps that have been circulated before may pose a relatively low risk and warrant only an \u201cinformational\u201d warning to the user. On the other hand, credentials stolen recently by info stealer software are at high risk and require immediate remediation by the affected users.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/azure-active-directory\">Microsoft Azure Active Directory<\/a> (Azure AD) supports identity protection and can score user risk as low, medium, or high. The integration with Identity Intelligence complements that insight, layering more context and transparency into the risks associated with users\u2019 identities. The easiest way to do this is by placing an at-risk user into one or more security groups based on the Identity Intelligence available from Recorded Future and pushing the details of Recorded Future\u2019s Identity Intelligence into <a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-sentinel\">Microsoft Sentinel<\/a>. That allows forensic teams to examine the compromised credentials and respond to any potential incidents.<\/p>\n<h2>A Microsoft Sentinel example<\/h2>\n<p>Imagine how your company\u2019s attack surface is constantly growing and your security team is seeing more events with each passing day. The team has too little context on user activity, so it can\u2019t connect the dots between the external risk of detected threats and other insights. Its responses grow slower, increasing the likelihood that threats will slip through the cracks.<\/p>\n<p>Identity Intelligence integrates with Azure AD through <a href=\"https:\/\/azure.microsoft.com\/services\/logic-apps\/\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Logic Apps<\/a>. It uses one playbook to connect to Azure AD and <a href=\"https:\/\/www.recordedfuture.com\/integrations\/microsoft\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel<\/a> and mitigate security risk by automatically positioning threat data in your Microsoft Sentinel environment. By layering real-time evidence on top of internal activity in Microsoft Sentinel, Identity Intelligence gives your security analysts the evidence they need to deal with threats.<\/p>\n<p>Recorded Future is a member of the Microsoft Intelligent Security Association (MISA). It joins the independent software vendors and <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/07\/14\/microsoft-intelligent-security-association-managed-security-service-providers\/\">managed security service providers<\/a> who integrate their solutions with Microsoft products to better defend against threats. Recorded Future indicators are also available as <a href=\"https:\/\/docs.microsoft.com\/graph\/api\/resources\/security-api-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Graph Security API<\/a> indicators for use in security products from Microsoft and other partners.<\/p>\n<h2>Take the next step<\/h2>\n<p>Strong identity authentication is a must-have as your company faces a growing threat landscape and higher attack volumes.<\/p>\n<p>Identity Intelligence from Recorded Future uses a combination of public sources and proprietary methods to help security teams to focus on the highest-risk user activity. It enables companies to address threats automatically, with out-of-the-box integrations and real-time insights for Azure AD and Microsoft Sentinel.<\/p>\n<h2>Learn more<\/h2>\n<p>To learn more about the Microsoft Intelligent Security Association (MISA),&nbsp;<a href=\"https:\/\/aka.ms\/MISA\">visit the website<\/a>&nbsp;where you can learn about the MISA program, product integrations, and find MISA members. Visit the\u202f<a href=\"https:\/\/www.youtube.com\/playlist?list=PL3ZTgFEc7LyuEBQ_f-hBZXpbKHItlAd5-\" target=\"_blank\" rel=\"noreferrer noopener\">video playlist<\/a>\u202fto learn about the strength of member\u202fintegrations\u202fwith Microsoft products.\u202f&nbsp;<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and Twitter (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/21\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to protect your organization beyond multifactor authentication with the integration of Microsoft Sentinel with Identity Intelligence from Recorded Future.<br \/>\nThe post Gain real-time identity protection with Microsoft and Recorded Future appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51114,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,6696,9060,405,7582,8630,836],"class_list":["post-51113","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-identity-and-access-management","tag-identity-and-access-management-series","tag-mfa","tag-microsoft-intelligent-security-association-misa","tag-misa","tag-multi-factor-authentication"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gain real-time identity protection with Microsoft and Recorded Future 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gain real-time identity protection with Microsoft and Recorded Future 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-21T16:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/CLO22_Cafe_005-1-1.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Gain real-time identity protection with Microsoft and Recorded Future\",\"datePublished\":\"2023-03-21T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/\"},\"wordCount\":1239,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/gain-real-time-identity-protection-with-microsoft-and-recorded-future.jpg\",\"keywords\":[\"Cybersecurity\",\"Identity and access management\",\"Identity and access management series\",\"MFA\",\"Microsoft Intelligent Security Association (MISA)\",\"MISA\",\"multi-factor authentication\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/\",\"name\":\"Gain real-time identity protection with Microsoft and Recorded Future 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/gain-real-time-identity-protection-with-microsoft-and-recorded-future.jpg\",\"datePublished\":\"2023-03-21T16:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/gain-real-time-identity-protection-with-microsoft-and-recorded-future.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/gain-real-time-identity-protection-with-microsoft-and-recorded-future.jpg\",\"width\":800,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Gain real-time identity protection with Microsoft and Recorded Future\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gain real-time identity protection with Microsoft and Recorded Future 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/","og_locale":"en_US","og_type":"article","og_title":"Gain real-time identity protection with Microsoft and Recorded Future 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-03-21T16:00:00+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/CLO22_Cafe_005-1-1.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Gain real-time identity protection with Microsoft and Recorded Future","datePublished":"2023-03-21T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/"},"wordCount":1239,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/gain-real-time-identity-protection-with-microsoft-and-recorded-future.jpg","keywords":["Cybersecurity","Identity and access management","Identity and access management series","MFA","Microsoft Intelligent Security Association (MISA)","MISA","multi-factor authentication"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/","url":"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/","name":"Gain real-time identity protection with Microsoft and Recorded Future 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/gain-real-time-identity-protection-with-microsoft-and-recorded-future.jpg","datePublished":"2023-03-21T16:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/gain-real-time-identity-protection-with-microsoft-and-recorded-future.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/gain-real-time-identity-protection-with-microsoft-and-recorded-future.jpg","width":800,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/gain-real-time-identity-protection-with-microsoft-and-recorded-future\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Gain real-time identity protection with Microsoft and Recorded Future"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51113"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51113\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51114"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}