Microsoft CISO: Security teams are better equipped than ever before

(Image credit: Shutterstock / Zeeker2526)

Cybercriminals no longer have the upper hand over security professionals, according to Microsoft CISO Bret Arsenault, who attributes the shift in power dynamic to the rise of cloud-based services and platforms.

Speaking to media, Arsenault discussed Microsoft’s approach to protecting both itself and its customers against an ever-evolving arsenal of threats - particularly in light of the remote working boom.

According to Arsenault, the ability to shield customers and staff effectively comes down to the capacity to feed security systems with the greatest quantity and most diverse range of information - something that would not have been possible before the rise of cloud services and AI.

“One of the largest shifts in the security landscape is the migration to cloud services, which gives us amazing opportunity and telemetry,” he explained.

“Training models on a massive set of signals gives us better detection facilities. Bad actors do not have this kind of access - and security teams are therefore not as disadvantaged as they once were.”

Microsoft security

Today, Microsoft receives telemetry from an enviable variety of different sources, be that email services, documents, browsing activity, identity data and more.

The company also updates over a billion Windows PCs per month as part of its regular update program, which also yields a wealth of data that can be channelled towards security efforts.

This range of signal sources, according to Arsenault, is the firm’s primary ammunition against the efforts of cybercriminals.

“In the past, we’d count on network signal [to inform our approach to security], but now you need diversity of signal for ample protection,” he said.

“All of this scale gives you great opportunity for statistically significant findings. But more important than scale is diversity of scale - network signal, endpoint signal, identity signal, application signal etc.”

“The aggregate value of these diverse signals gives us an unprecedented ability to protect [against attack].”

Arsenault also touted the importance of a zero trust mindset, especially in a post-coronavirus context in which a significant proportion of employees remain remote.

A zero trust model dictates that any entity attempting to gain access to the corporate network must first be verified - unlike in traditional network scenarios, in which any individual present on company premises could gain access to corporate assets.

“The control plane for security was once the network, but today we believe the control plane has shifted to identity. That’s the most important change that has happened as part of the client to cloud transition,” asserted Arsenault.

“Being on a corporate boundary shouldn’t impact the security footprint. In today’s global environment, with many people working remotely, identity is a much more scalable way than a network to provide a secure working environment.”

For Microsoft, then, a strong cybersecurity posture in today’s landscape boils down to three key elements:

  • Strong identity management, ensuring a person is who they say they are
  • Telemetry analysis to help augment security policies
  • Monitoring device health to patch any chinks in the endpoint security armor
TOPICS
Joel Khalili
News and Features Editor

Joel Khalili is the News and Features Editor at TechRadar Pro, covering cybersecurity, data privacy, cloud, AI, blockchain, internet infrastructure, 5G, data storage and computing. He's responsible for curating our news content, as well as commissioning and producing features on the technologies that are transforming the way the world does business.

Latest in Security
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
Lock on Laptop Screen
Medusa ransomware is able to disable anti-malware tools, so be on your guard
An abstract image of digital security.
Fake file converters are stealing info, pushing ransomware, FBI warns
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Coinbase targeted after recent Github attacks
hacker.jpeg
Key trusted Microsoft platform exploited to enable malware, experts warn
IBM office logo
IBM to provide platform for flagship cyber skills programme for girls
Latest in News
Disney Plus logo with popcorn
You can finally tell Disney+ to stop bugging you about that terrible Marvel show you regret starting
Girl wearing Meta Quest 3 headset interacting with a jungle playset
Latest Meta Quest 3 software beta teases a major design overhaul and VR screen sharing – and I need these updates now
Philips Hue
Philips Hue might be working on a video doorbell, and according to a new report, we just got our first look at it
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
The Samsung Galaxy S25 Edge on display the January 22, 2025 Galaxy Unpacked event.
A fresh Samsung Galaxy S25 Edge leak hints at a 2K display and a titanium frame
Hatch Restore 3 in Putty
You can finally start your day with The Office theme song, and I couldn't be more excited