{"id":870,"date":"2015-02-01T19:40:20","date_gmt":"2015-02-02T03:40:20","guid":{"rendered":""},"modified":"2025-06-30T14:03:17","modified_gmt":"2025-06-30T21:03:17","slug":"achieving-resilience-against-modern-cyberthreats","status":"publish","type":"post","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/","title":{"rendered":"Achieving resilience against modern cyberthreats"},"content":{"rendered":"\n<p>Our whitepaper explores how you can protect, detect, and defend against modern cyberthreats in your enterprise.<\/p>\n\n\n\n<p>As our use of mobile computing and social media grows, so does our exposure to risk. As any member of the modern workforce knows, the widespread adoption of cloud services and big data technologies has created unprecedented opportunities for mobile and social productivity. Yet without the right defenses in place, they can also open us to new kinds of vulnerabilities, as attacks that target devices operating outside the enterprise perimeter are quickly growing in volume and sophistication.<\/p>\n\n\n\n<p>Passive protection is no longer sufficient for ensuring the security of information and IT infrastructures. Our recent Microsoft whitepaper, <a href=\"http:\/\/cm-edgetun.pages.dev\/en-us\/download\/details.aspx?id=42267\" target=\"_blank\" rel=\"noopener\">Achieving Resilience Against Modern CyberThreats<\/a>, explores the ways that governments and enterprises can protect their valuable information by creating a holistic, risk-aware security strategy to achieve resilience against in an era of constant targeted attacks and determined adversaries.<\/p>\n\n\n\n<p>The paper explores Microsoft\u2019s holistic <strong>Protect<\/strong>, <strong>Detect<\/strong> and <strong>Respond<\/strong> approach to security strategy, including key principles for organizations, the importance of trustworthy cloud services, and the steps to take for securing an IT infrastructure in today\u2019s threat landscape. This proactive strategy requires that an organization understand its assets and its exposure, and apply appropriate protection throughout the entire IT ecosystem in a continuous process. It also recognizes that enterprises must manage their inevitable risk \u2013 absolute security is not possible, so organizations must go beyond just protecting resources and also establish processes for detecting, responding and recovering from incidents when they occur.<\/p>\n\n\n\n<p>In order increase an enterprise\u2019s resilience against threats and \u201cboost the IT immune system,\u201d organizations need a security strategy that includes a resilient infrastructure based in trustworthy cloud services\u2014as well as good IT hygiene and policy-based access to information. This includes taking steps such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Upgrading operating systems and managing patches<\/li>\n\n\n\n<li>Aligning the Active Directory to the threat environment<\/li>\n\n\n\n<li>Assessing threats and counter-measures<\/li>\n\n\n\n<li>Implementing secure software development<\/li>\n<\/ul>\n\n\n\n<p>No one understands the complexity of this challenge better than Microsoft. Our world-class <a href=\"http:\/\/cm-edgetun.pages.dev\/en-us\/twc\/default.aspx\" target=\"_blank\" rel=\"noopener\">Trustworthy Computing<\/a> (TwC) Initiative has been developing secure and reliable computing solutions for more than a decade, laying the foundation for advanced solutions and services to help customers protect themselves against the attacks of determined adversaries and quickly recover key IT systems in the aftermath of a breach.<\/p>\n\n\n\n<p>Read the <a href=\"http:\/\/cm-edgetun.pages.dev\/en-us\/download\/details.aspx?id=42267\" target=\"_blank\" rel=\"noopener\">white paper<\/a> to learn more about how public and private sector organizations can protect their critical information in today\u2019s rapidly evolving risk landscape.<\/p>\n\n\n\n<p>Reto Haeni<br>Chief Security Officer and Advisor for Western Europe, Microsoft<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our whitepaper explores how you can protect, detect, and defend against modern cyberthreats in your enterprise. As our use of mobile computing and social media grows, so does our exposure to risk.<\/p>\n","protected":false},"author":633,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1515],"post_tag":[],"content-type":[1483],"coauthors":[4308],"class_list":["post-870","post","type-post","status-publish","format-standard","hentry","category-government","content-type-thought-leadership","review-flag-microsofts-microsofts","review-flag-new-1593580249-279"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Achieving resilience against modern cyberthreats - Microsoft Industry Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Achieving resilience against modern cyberthreats - Microsoft Industry Blogs\" \/>\n<meta property=\"og:description\" content=\"Our whitepaper explores how you can protect, detect, and defend against modern cyberthreats in your enterprise. As our use of mobile computing and social media grows, so does our exposure to risk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-02T03:40:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-30T21:03:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/01\/cropped-microsoft_logo_element.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Industry for Government Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Industry for Government Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/\"},\"author\":[{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/author\/microsoft-industry-for-government-team\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Industry for Government Team\"}],\"headline\":\"Achieving resilience against modern cyberthreats\",\"datePublished\":\"2015-02-02T03:40:20+00:00\",\"dateModified\":\"2025-06-30T21:03:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/\"},\"wordCount\":424,\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\"},\"articleSection\":[\"Government\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/\",\"name\":\"Achieving resilience against modern cyberthreats - Microsoft Industry Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website\"},\"datePublished\":\"2015-02-02T03:40:20+00:00\",\"dateModified\":\"2025-06-30T21:03:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Achieving resilience against modern cyberthreats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Achieving resilience against modern cyberthreats - Microsoft Industry Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/","og_locale":"en_US","og_type":"article","og_title":"Achieving resilience against modern cyberthreats - Microsoft Industry Blogs","og_description":"Our whitepaper explores how you can protect, detect, and defend against modern cyberthreats in your enterprise. As our use of mobile computing and social media grows, so does our exposure to risk.","og_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/","og_site_name":"Microsoft Industry Blogs","article_published_time":"2015-02-02T03:40:20+00:00","article_modified_time":"2025-06-30T21:03:17+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/01\/cropped-microsoft_logo_element.png","type":"image\/png"}],"author":"Microsoft Industry for Government Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Microsoft Industry for Government Team","Est. reading time":"2 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/#article","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/"},"author":[{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/author\/microsoft-industry-for-government-team\/","@type":"Person","@name":"Microsoft Industry for Government Team"}],"headline":"Achieving resilience against modern cyberthreats","datePublished":"2015-02-02T03:40:20+00:00","dateModified":"2025-06-30T21:03:17+00:00","mainEntityOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/"},"wordCount":424,"publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization"},"articleSection":["Government"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/","name":"Achieving resilience against modern cyberthreats - Microsoft Industry Blogs","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website"},"datePublished":"2015-02-02T03:40:20+00:00","dateModified":"2025-06-30T21:03:17+00:00","breadcrumb":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"Achieving resilience against modern cyberthreats"}]},{"@type":"WebSite","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/","name":"Microsoft Industry Blogs","description":"","publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization","name":"Microsoft Industry Blogs","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Industry Blogs","distributor_original_site_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/users\/633"}],"replies":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/comments?post=870"}],"version-history":[{"count":1,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/870\/revisions"}],"predecessor-version":[{"id":122646,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/870\/revisions\/122646"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media?parent=870"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/categories?post=870"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=870"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=870"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}