Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Governance & Risk Management

ISMG Editors: Why Are Microsoft's Systems So Vulnerable?

Also: AI in Cloud Security, Integrating Zero Trust Principles into API Deployment
Clockwise, from top left: Anna Delaney, Tony Morbin, Tom Field and Suparna Goswami

In the latest weekly update, ISMG editors discussed the potential role of AI in cloud security, how the recent cyberattack on Microsoft by Russian state hackers highlighted the vulnerabilities associated with legacy systems, and how to secure APIs in the age of zero trust.

See Also: The Healthcare CISO’s Guide to Medical IoT Security

The panelists - Anna Delaney, director, productions; Tony Morbin, executive news editor, EU; Tom Field, senior vice president, editorial; and Suparna Goswami, associate editor, ISMG Asia - discussed:

  • The challenges within cloud security that artificial intelligence can tackle;
  • The recent cyberattack on Microsoft by Russian state hackers, which has raised concerns about the company's ability to secure itself and its customers;
  • Highlights from an interview with CISO Rohit Rane of HDFC Pension Management Co. on how organizations that have numerous applications can simplify the process of integrating zero trust principles.

The ISMG Editors' Panel runs weekly. Don't miss our previous installments, including the Jan. 19 edition on why crypto phishing attacks are surging and the Jan. 26 edition on emerging AI tech for cloud security in 2024.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.