Home

Real examples of hacking and malware attacks then what Microsoft did to stop them

%3CLINGO-SUB%20id%3D%22lingo-sub-12367%22%20slang%3D%22en-US%22%3EReal%20examples%20of%20hacking%20and%20malware%20attacks%20then%20what%20Microsoft%20did%20to%20stop%20them%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-12367%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EOn%20this%20week's%20show%2C%20we%20catch%20up%20again%20with%20Mark%20Russinovich%20to%20explain%20the%20how%20security%20components%20in%20cloud%20services%20are%20managed.%20Mark%20discusses%20the%20shared%20responsibility%20from%20the%20IT%20and%20service%20provider%20perspectives.%20We%20also%20cover%20real%20customer%20examples%20of%20Microsoft%20working%20with%20customers%20to%20detect%20tenant%20breach%2C%20correct%20issues%20and%20patch%20any%20security%20vulnerabilities.%20We%20also%20discuss%20the%20upcoming%20customer%20lockbox%20process%20and%20how%20machine%20learning%20and%20data%20analytics%20can%20be%20used%20to%20detect%20anomalous%20patterns.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3CIFRAME%20width%3D%22560%22%20height%3D%22315%22%20src%3D%22https%3A%2F%2Fwww.youtube.com%2Fembed%2Fy8Z_0CEJEQY%3Flist%3DPLXtHYVsvn_b_v4EKljH6dGo9qJ7JjItWL%22%20frameborder%3D%220%22%20allowfullscreen%3D%22%22%3E%3C%2FIFRAME%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-12367%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Michael Holste
Microsoft

On this week's show, we catch up again with Mark Russinovich to explain the how security components in cloud services are managed. Mark discusses the shared responsibility from the IT and service provider perspectives. We also cover real customer examples of Microsoft working with customers to detect tenant breach, correct issues and patch any security vulnerabilities. We also discuss the upcoming customer lockbox process and how machine learning and data analytics can be used to detect anomalous patterns.