Forum Discussion

MichaelHolste's avatar
MichaelHolste
Icon for Microsoft rankMicrosoft
Sep 14, 2016

Real examples of hacking and malware attacks then what Microsoft did to stop them

On this week's show, we catch up again with Mark Russinovich to explain the how security components in cloud services are managed. Mark discusses the shared responsibility from the IT and service provider perspectives. We also cover real customer examples of Microsoft working with customers to detect tenant breach, correct issues and patch any security vulnerabilities. We also discuss the upcoming customer lockbox process and how machine learning and data analytics can be used to detect anomalous patterns.

 

 

No RepliesBe the first to reply

Resources