Skip to main content

Microsoft Industry Blogs - Canada: Uncategorized

Published

Filling the cybersecurity skills gap 

In cybersecurity, the present moment is one of both opportunity and crisis. The demand for cybersecurity professionals is growing rapidly, but there are simply not enough trained professionals to meet the current needs.

Published

Disrupting the SOC: Empowering your analysts to reduce burnout 

According to Richard Pethia from Carnegie Mellon University, DARPA (the Defense Advanced Research Projects Agency) established the first Security Operations Center (SOC), the CERT/CC (Computer Emergency Response Team/Coordination Center) in 1988 in the aftermath of the infamous Morris Worm propagation.

Published

Zero Trust for networking 

Over the last year, the demand for cloud-based services and applications has dramatically increased and the need to scale pushed to new levels. We are moving away from an era where networks were clearly defined and usually specific to a certain location. Now there isn't necessarily a contained/defined network to secure, but instead a vast portfolio of devices and networks, all linked by the cloud. Cybercriminals however are taking advantage of this shift, with increase occurring in DDoS attacks, ransomware and phishing campaigns.

Published

Zero Trust for identity – the modern security model to stay productive and secure 

Cybersecurity used to be a lot easier. IT teams did their best to build a security perimeter—a walled garden—where they could treat anything or anyone in that network as secure. This classic approach of attempting to restrict everything to a “secure” network does not accommodate the modern world, where almost everyone works remotely from different types of devices, including personal phones and tablets.

Published

Zero Trust for devices—new approaches for today’s new reality 

Through the new realities of working from home, organizations are seeing a substantial increase in the diversity of devices accessing their networks. In a receive survey, due to the pandemic, 86% of IT leaders say at least ¼ of their staff are connecting to the corporate networks through personal and shared devices right now. With not all endpoints being managed, or even owned by the organization, this can lead to different device configurations and software patch levels, increasing the potential attack surface.

Published

Zero Trust for apps – discovering, securing, and monitoring every app you use 

The way we worked evolved rapidly in 2020. Organizations around the world have adapted and embraced remote work. With employees working from home, being able to connect to any resource, on any device, inclusive of using personal devices, has become a productivity requirement to be able complete their work. In turn, IT still has the responsibility to find the right balance between enabling productivity, while maintaining control to protect critical data.