New Blog Post | Learn how Microsoft strengthens IoT and OT security with Zero Trust

%3CLINGO-SUB%20id%3D%22lingo-sub-2943814%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Learn%20how%20Microsoft%20strengthens%20IoT%20and%20OT%20security%20with%20Zero%20Trust%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2943814%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22MSFT_Security_NSCAM_Image_Mail-900x360.jpg%22%20style%3D%22width%3A%20900px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F325617iA4218F4D347AEA78%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22MSFT_Security_NSCAM_Image_Mail-900x360.jpg%22%20alt%3D%22MSFT_Security_NSCAM_Image_Mail-900x360.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F11%2F08%2Flearn-how-microsoft-strengthens-iot-and-ot-security-with-zero-trust%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ELearn%20how%20Microsoft%20strengthens%20IoT%20and%20OT%20security%20with%20Zero%20Trust%20-%20Microsoft%20Security%20Blog%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EAs%20cyber%20threats%20grow%20more%20sophisticated%20and%20relentless%2C%20the%20need%20for%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecuritynow%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ECybersecurity%20Awareness%20Month%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Ebecomes%20more%20urgent%20every%20year.%20As%20part%20of%20our%20year-round%20commitment%20to%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Esecurity%20for%20all%3C%2FA%3E%2C%20Microsoft%20continues%20to%20track%20numerous%20incidents%20targeting%20both%20digital%20and%20physical%20operations%20for%20many%20organizations.%20Beyond%20the%20usual%20espionage%20and%20data-theft%20attacks%20aimed%20at%20IT%20systems%2C%20threat%20actors%20have%20increasingly%20turned%20their%20attention%20toward%20IoT%20devices%20and%20operational%20technology%20(OT)%20equipment%E2%80%94%3CWBR%20%2F%3Eeverything%20from%20oil%20pipelines%3CSUP%3E1%3C%2FSUP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eto%20medical%20devices.%3CSUP%3E2%3C%2FSUP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3EMalicious%20actors%20have%20also%20had%20success%20in%20targeting%20supply%20chains%2C%20as%20seen%20in%20the%20insidious%20Solorigate%3CSUP%3E3%3C%2FSUP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eand%20Kaseya%3CSUP%3E4%3C%2FSUP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eattacks.%3C%2FP%3E%0A%3CP%3EEarlier%20this%20month%2C%20we%20published%20the%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fmicrosoft-digital-defense-report%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E2021%20Microsoft%20Digital%20Defense%20Report%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eto%20help%20organizations%20better%20understand%20this%20evolving%20threat%20landscape%2C%20as%20well%20as%20provide%20guidance%20on%20securing%20your%20supply%20chain%20and%20IoT%20and%20OT%20assets.%20In%20the%20spirit%20of%20security%20for%20all%2C%20some%20highlights%20of%20these%20chapters%20are%20presented%20here%20for%20easy%20reference.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2943814%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

MSFT_Security_NSCAM_Image_Mail-900x360.jpg

Learn how Microsoft strengthens IoT and OT security with Zero Trust - Microsoft Security Blog

As cyber threats grow more sophisticated and relentless, the need for Cybersecurity Awareness Month becomes more urgent every year. As part of our year-round commitment to security for all, Microsoft continues to track numerous incidents targeting both digital and physical operations for many organizations. Beyond the usual espionage and data-theft attacks aimed at IT systems, threat actors have increasingly turned their attention toward IoT devices and operational technology (OT) equipment—everything from oil pipelines1 to medical devices.2 Malicious actors have also had success in targeting supply chains, as seen in the insidious Solorigate3 and Kaseya4 attacks.

Earlier this month, we published the 2021 Microsoft Digital Defense Report to help organizations better understand this evolving threat landscape, as well as provide guidance on securing your supply chain and IoT and OT assets. In the spirit of security for all, some highlights of these chapters are presented here for easy reference.

0 Replies