{"id":2270,"date":"2017-03-02T04:55:42","date_gmt":"2017-03-02T12:55:42","guid":{"rendered":"https:\/\/cm-edgetun.pages.dev\/industry\/blog\/uncategorized\/cybersecurity-for-the-most-challenging-requirements\/"},"modified":"2023-07-07T13:16:14","modified_gmt":"2023-07-07T20:16:14","slug":"cybersecurity-for-the-most-challenging-requirements","status":"publish","type":"post","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/","title":{"rendered":"Cybersecurity for the most challenging requirements"},"content":{"rendered":"<p>I\u2019ve spent the past 10 years working with Microsoft clients in the defense and intelligence communities\u2014both in the United States and worldwide. Cybersecurity is arguably the No. 1 priority for these customers because of what\u2019s at stake: compromises to national security, military operations, and classified and sensitive information.<\/p>\n<p>The cybersecurity challenge is pervasive and escalating as countries increasingly rely on information technology as part of their critical infrastructure. I enjoy meeting with those responsible for protecting their public safety and national security assets, whether it be a country\u2019s military or civilian branches, intelligence officials, law enforcement agencies or other organizations. Here\u2019s a synopsis of what we typically discuss.<\/p>\n<h2>Cybersecurity landscape<\/h2>\n<p>Security in a cloud-first, mobile-first world calls for a new approach. Data is accessed, used and shared on premise and in the cloud, erasing traditional security boundaries. When approaching this challenging cybersecurity landscape and the digital transformation needed to protect national security and defense assets from evolving threats, Microsoft leverages our comprehensive platform, unique intelligence and partnerships. We help customers achieve a balance of security and end-user empowerment, with effective security controls across identity, device, data and apps, and infrastructure. Our approach protects an organization\u2019s data against unauthorized access, detects attacks and breaches, and helps the responsible IT team respond and adapt to prevent future attacks.<\/p>\n<p>The Microsoft protect-detect-respond model is built on our expertise and experience of:<\/p>\n<ul>\n<li>Having more than 200 consumer and commercial cloud services<\/li>\n<li>Updating more than 1 billion devices monthly<\/li>\n<li>Handling 300 billion-plus authentications per month<\/li>\n<li>Analyzing 200 billion emails per month<\/li>\n<li>Reviewing 18 billion web pages\/queries per month.<\/li>\n<\/ul>\n<h2>A secure modern enterprise<\/h2>\n<p>Microsoft&#8217;s secure modern enterprise secures the four pillars: identity, data and apps, infrastructure, and devices.<\/p>\n<ul>\n<li>Identity: Embraces identity as primary security perimeter and protects identity systems, admins, and credential as top priorities.<\/li>\n<li>Apps and Data: Aligns security investments with business priories including identifying and securing communications, data, and applications.<\/li>\n<li>Infrastructure: Operates on modern platform and uses cloud intelligence to detect and remediate both vulnerabilities and attacks.<\/li>\n<li>Devices: Accesses assets from trusted devices with hardware security assurances, great user experience, and advanced threat detection.<\/li>\n<\/ul>\n<h2>Microsoft solutions<\/h2>\n<p>By building security into Microsoft products and services from the start, we deliver a comprehensive, agile platform to better protect endpoints, move faster to detect threats, and respond to security breaches across the largest of organizations, including those with the most challenging cybersecurity requirements. Here are a few examples:<\/p>\n<h3><a href=\"https:\/\/technet.microsoft.com\/itpro\/windows\/keep-secure\/windows-10-security-guide\" target=\"_blank\" rel=\"noopener\">Windows 10 key security improvements<\/a>:<\/h3>\n<ul>\n<li>Pre-boot authentication improvement<\/li>\n<li>Disallow hot-plug <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/aa447493.aspx\" target=\"_blank\" rel=\"noopener\">Direct Memory Access<\/a> (DMA) until user signs in and when locked<\/li>\n<li>Automatic device encryption with <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/\" target=\"_blank\" rel=\"noopener\">Azure Active Directory<\/a> (AAD) sign-in to Windows<\/li>\n<li>Supports backup of <a href=\"https:\/\/technet.microsoft.com\/en-us\/itpro\/windows\/keep-secure\/bitlocker-overview\" target=\"_blank\" rel=\"noopener\">BitLocker<\/a> recovery password to AAD<\/li>\n<li>BitLocker support for virtual machines using Virtual <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/cc749022(v=ws.10).aspx\" target=\"_blank\" rel=\"noopener\">Trusted Platform Module<\/a> (vTPM).<\/li>\n<\/ul>\n<h3><a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/mt728166.aspx\" target=\"_blank\" rel=\"noopener\">Azure Security Center<\/a> stands on four security pillars:<\/h3>\n<ul>\n<li>Provide visibility and control across your distributed cloud deployments<\/li>\n<li>Unlock agility so that IT pros, security professionals and DevOps teams can quickly take advantage of cloud efficiencies through policy-driven security recommendations<\/li>\n<li>Prevent threats by providing enlightened security signals and alerts that are based on context-correlated threat intelligence derived from Microsoft\u2019s vast global intelligence assets and expertise<\/li>\n<li>Deploy with confidence so that you trust development, operations and infrastructure on Azure.<\/li>\n<\/ul>\n<h3><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/cloud-platform\/enterprise-mobility-security\" target=\"_blank\" rel=\"noopener\">Microsoft Enterprise Mobility + Security<\/a> (EMS) is the ideal solution for <a href=\"https:\/\/products.office.com\/en-US\/business\/office\" target=\"_blank\" rel=\"noopener\">Office 365<\/a> customers looking to extend the protection of their Office 365 data.<\/h3>\n<ul>\n<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/cloud-platform\/azure-active-directory\" target=\"_blank\" rel=\"noopener\">Azure Active Directory Premium<\/a> is a comprehensive, highly available identity and access management cloud solution that combines core directory services, advanced identity governance and application access management<\/li>\n<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/cloud-platform\/microsoft-intune\" target=\"_blank\" rel=\"noopener\">Microsoft Intune<\/a> provides mobile device management, mobile application management and PC management capabilities through one unified console<\/li>\n<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/cloud-platform\/cloud-app-security\" target=\"_blank\" rel=\"noopener\">Microsoft Cloud App Security<\/a> provides deep visibility, comprehensive controls and improved protection for all cloud applications in your network<\/li>\n<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/cloud-platform\/azure-information-protection\" target=\"_blank\" rel=\"noopener\">Azure Information Protection<\/a> provides persistent data protection of files shared internally and externally, including options to automatically classify and label files based on sensitivity<\/li>\n<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/cloud-platform\/advanced-threat-analytics\" target=\"_blank\" rel=\"noopener\">Microsoft Advanced Threat Analytics<\/a> helps protect on premise resources from advanced targeted attacks by automatically analyzing, learning and identifying normal and abnormal entity behavior<\/li>\n<li><a href=\"http:\/\/fasttrack.microsoft.com\/ems\" target=\"_blank\" rel=\"noopener\">FastTrack for EMS<\/a> includes resources, tools and experts to make your rollout of EMS a success for both you and your end users.<\/li>\n<\/ul>\n<p>Our goal is to ensure that government organizations have the trust, security and compliance they need to protect sensitive data. Please <a href=\"https:\/\/info.microsoft.com\/GovernmentContactMe.html\" target=\"_blank\" rel=\"noopener\">contact us<\/a> to address your cybersecurity challenges and learn more by visiting:<\/p>\n<ul>\n<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/security\/default.aspx\" target=\"_blank\" rel=\"noopener\">Microsoft Cybersecurity<\/a><\/li>\n<li><a href=\"https:\/\/info.microsoft.com\/SecurityIntelligenceReportDataInsights_Registration.html?ls=Website&amp;lsd=security\" target=\"_blank\" rel=\"noopener\">Get the free e-book: 2016 Trends in Cybersecurity<\/a><\/li>\n<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/trustcenter\" target=\"_blank\" rel=\"noopener\">Microsoft Trust Center<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is top of mind for public safety and national security professionals\u2014and Microsoft\u2019s Kris Teutsch.<\/p>\n","protected":false},"author":843,"featured_media":10203,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1515],"post_tag":[],"content-type":[1483],"coauthors":[4308],"class_list":["post-2270","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government","content-type-thought-leadership"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity for the most challenging requirements - Microsoft Industry Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity for the most challenging requirements - Microsoft Industry Blogs\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is top of mind for public safety and national security professionals\u2014and Microsoft\u2019s Kris Teutsch.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-02T12:55:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-07T20:16:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/02\/data_feat.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Microsoft Industry for Government Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Industry for Government Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/\"},\"author\":[{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/author\/microsoft-industry-for-government-team\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Industry for Government Team\"}],\"headline\":\"Cybersecurity for the most challenging requirements\",\"datePublished\":\"2017-03-02T12:55:42+00:00\",\"dateModified\":\"2023-07-07T20:16:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/\"},\"wordCount\":736,\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/02\/data_feat.jpg\",\"articleSection\":[\"Government\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/\",\"name\":\"Cybersecurity for the most challenging requirements - Microsoft Industry Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/02\/data_feat.jpg\",\"datePublished\":\"2017-03-02T12:55:42+00:00\",\"dateModified\":\"2023-07-07T20:16:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/#primaryimage\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/02\/data_feat.jpg\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/02\/data_feat.jpg\",\"width\":960,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity for the most challenging requirements\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity for the most challenging requirements - Microsoft Industry Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity for the most challenging requirements - Microsoft Industry Blogs","og_description":"Cybersecurity is top of mind for public safety and national security professionals\u2014and Microsoft\u2019s Kris Teutsch.","og_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/","og_site_name":"Microsoft Industry Blogs","article_published_time":"2017-03-02T12:55:42+00:00","article_modified_time":"2023-07-07T20:16:14+00:00","og_image":[{"width":960,"height":300,"url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/02\/data_feat.jpg","type":"image\/jpeg"}],"author":"Microsoft Industry for Government Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Microsoft Industry for Government Team","Est. reading time":"3 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/#article","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/"},"author":[{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/author\/microsoft-industry-for-government-team\/","@type":"Person","@name":"Microsoft Industry for Government Team"}],"headline":"Cybersecurity for the most challenging requirements","datePublished":"2017-03-02T12:55:42+00:00","dateModified":"2023-07-07T20:16:14+00:00","mainEntityOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/"},"wordCount":736,"publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/02\/data_feat.jpg","articleSection":["Government"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/","name":"Cybersecurity for the most challenging requirements - Microsoft Industry Blogs","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/#primaryimage"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/02\/data_feat.jpg","datePublished":"2017-03-02T12:55:42+00:00","dateModified":"2023-07-07T20:16:14+00:00","breadcrumb":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/#primaryimage","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/02\/data_feat.jpg","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/02\/data_feat.jpg","width":960,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2017\/03\/02\/cybersecurity-for-the-most-challenging-requirements\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity for the most challenging requirements"}]},{"@type":"WebSite","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/","name":"Microsoft Industry Blogs","description":"","publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization","name":"Microsoft Industry Blogs","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Industry Blogs","distributor_original_site_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/2270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/users\/843"}],"replies":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/comments?post=2270"}],"version-history":[{"count":0,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/2270\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media\/10203"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media?parent=2270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/categories?post=2270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=2270"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=2270"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=2270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}