{"id":131380,"date":"2023-11-15T08:00:00","date_gmt":"2023-11-15T16:00:00","guid":{"rendered":""},"modified":"2025-08-07T15:51:31","modified_gmt":"2025-08-07T22:51:31","slug":"microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/","title":{"rendered":"Microsoft unveils expansion of AI for security and security for AI at Microsoft Ignite"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"the-future-of-security-with-ai\">The future of security with AI<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The increasing speed, scale, and sophistication of recent cyberattacks demand a new approach to security. Traditional tools are no longer enough to keep pace with the threats posed by cybercriminals. In just two years, the number of password attacks detected by Microsoft has risen from 579 per second to more than 4,000 per second.<sup>1<\/sup> According to&nbsp;<a href=\"https:\/\/cybersecurityventures.com\/cybercrime-damage-costs-10-trillion-by-2025\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity Ventures<\/a>, the global cost of cybercrime is expected to reach $10.5 trillion by 2025, up from $3 trillion in 2015.<sup>2<\/sup> Many organizations use a disconnected and vast collection of fragmented security tools to manage their environment, resulting in security teams facing data deluge, alert fatigue, and limited visibility across security solutions. Security teams face an asymmetric challenge: they must protect everything, while cyberattackers only need to find one weak point. And security teams must do this while facing regulatory complexity, a global talent shortage, and rampant fragmentation.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">One of the advantages for security teams is their view of the data field\u2014they know how the infrastructure, user posture, and applications, are set up before a cyberattack begins. To further tip the scale in favor of cyberdefenders, Microsoft Security offers a very large-scale data advantage\u201465 trillion daily signals, expertise of global threat intelligence, monitoring more than 300 cyberthreat groups, and insights on cyberattacker behaviors from more than 1 million customers and more than 15,000 partners.<sup>1<\/sup> <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Our new generative AI solution\u2014<a href=\"https:\/\/www.microsoft.com\/security\/business\/ai-machine-learning\/microsoft-security-copilot\">Microsoft Security Copilot<\/a>\u2014combined with our massive data advantage and end-to-end security, all built on the principles of Zero Trust, creates a flywheel of protection to change the asymmetry of the digital threat landscape and favor security teams in this new era of security.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security\u2019s vision for the future and the latest generative AI announcements and demos, watch the Microsoft Ignite keynote \u201c<a href=\"https:\/\/ignite.microsoft.com\/en-US\/sessions\/6c03cba3-7dcd-4765-b856-047901576143?source=sessions\" target=\"_blank\" rel=\"noreferrer noopener\">The Future of Security with AI<\/a>\u201d presented by Charlie Bell, Executive Vice President, Microsoft Security, and I on Thursday, November 16, 2023, at 10:15 AM PT. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"changing-the-paradigm-with-microsoft-security-copilot\">Changing the paradigm with Microsoft Security Copilot<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">One of the biggest challenges in security is the lack of cybersecurity professionals. This is an urgent need given the three million unfilled positions in the field, with cyberthreats increasing in frequency and severity.<sup>3<\/sup>&nbsp;<\/p>\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture2-1.webp\" alt=\"Graphic explaining how preview participants in Microsoft Security Copilot demonstrated 44% more accurate responses across tasks.\" class=\"wp-image-132327 size-full webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture2-1.webp\"><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"wp-block-paragraph\">In a recent study to measure the productivity impact for &#8220;new in career&#8221; analysts, participants using Security Copilot demonstrated <strong>44 percent more accurate responses and were 26 percent faster across all tasks<\/strong>.<sup>4<\/sup>&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">According to the same study:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>86 percent<\/strong> reported that Security Copilot helped them improve the quality of their work.&nbsp;<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>83 percent<\/strong> stated that Security Copilot reduced the effort needed to complete the task.&nbsp;<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>86 percent<\/strong> said that Security Copilot made them more productive.&nbsp;<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>90 percent<\/strong> expressed their desire to use Security Copilot next time they do the same task.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Check out the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/10\/19\/microsoft-security-copilot-early-access-program-harnessing-generative-ai-to-empower-security-teams\/\">Security Copilot Early Access Program<\/a>\u2014with Microsoft Defender Threat Intelligence included at no additional charge\u2014that adds speed and scale for scenarios like security posture management, incident investigation and response, security reporting, and more\u2014now available to interested and qualified customers. For example, one early adopter from <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/1703669067334366976-wtw-insurance-microsoft-security-copilot\" target=\"_blank\" rel=\"noreferrer noopener\">Willis Towers Watson (WTW)<\/a> said \u201cI envision Microsoft Security Copilot as a change accelerator. The ability to do threat hunting at pace will mean that I\u2019m able to reduce my mean time to investigate, and the faster I can do that, the better my security posture will become.\u201d\u202f Keep reading for a full list of capabilities.<\/p>\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture1-3-1024x571.webp\" alt=\"Graphic showing the ways in which operational complexity is increasing for security teams. \" class=\"wp-image-132325 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture1-3-1024x571.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture1-3-300x167.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture1-3-768x428.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture1-3-1536x856.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture1-3-189x106.webp 189w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture1-3-418x232.webp 418w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture1-3.webp 1677w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture1-3-1024x571.webp\"><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"introducing-the-industry-s-first-generative-ai-powered-unified-security-operations-platform-with-built-in-copilot\">Introducing the industry&#8217;s first generative AI-powered unified security operations platform with built-in Copilot<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Security operations teams struggle to manage disparate security toolsets from siloed technologies and apps. This challenge is only exacerbated given the scarcity of skilled security talent. And while organizations have been investing in traditional AI and machine learning to improve threat intelligence, deploying AI and machine learning comes with its unique challenges and its own shortage of data science talent. It\u2019s time for a step-change in our industry, and thanks to generative AI, we can now close the talent gap for both security and data professionals. Securing an organization today requires an innovative approach that prevents, detects, and disrupts cyberattacks at machine speed, while delivering simplicity and and approachable,&nbsp;conversational experiences to help security operations center (SOC) teams move faster, and bringing together all the security signals and threat intelligence currently stuck in disconnected tools. Today, we are thrilled to announce the next major step in this industry-defining vision: <strong>combining the power of leading solutions in security information and event management (SIEM), extended detection and response (XDR), and generative AI for security into the first <\/strong><a href=\"https:\/\/aka.ms\/UnifiedSIEMXDR\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>unified security operations platform<\/strong><\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">By bringing together Microsoft Sentinel, Microsoft Defender XDR (previously Microsoft 365 Defender), and Microsoft Security Copilot, security analysts now have a unified incident experience that streamlines triage and provides a complete, end-to-end view of threats across the digital estate. With a single set of automation rules and playbooks enriched with generative AI, coordinating response is now easier and quicker for analysts of every level. In addition, unified hunting now gives analysts the ability to query all SIEM and XDR data in one place to uncover cyberthreats and take appropriate remediation action. Customers interested in joining the preview of the unified security operations platform should contact their account team.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture2-1024x576.jpg\" alt=\"Screenshot of the Microsoft Defender dashboard.\" class=\"wp-image-132229\" style=\"aspect-ratio:1.7777777777777777;width:724px;height:auto\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture2-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture2-300x169.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture2-768x432.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture2-615x346.jpg 615w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture2-336x189.jpg 336w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture2-189x106.jpg 189w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture2-630x354.jpg 630w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture2.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Further, Microsoft Security Copilot is natively embedded into the analyst experience supporting both SIEM and XDR and equipping analysts with step-by-step guidance and automation for investigating and resolving incidents, without the reliance of data analysts. Complex tasks, such as analyzing malicious scripts or crafting Kusto Query Language (KQL) queries to hunt across data in Microsoft Sentinel and Defender XDR, can be accomplished simply by asking a question in natural language or accepting a suggestion from Security Copilot. If you need to update your chief information security officer (CISO) on an incident, you can now instantly generate a polished report that summarizes the investigation and the remediation actions that were taken to resolve it.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To keep up with the speed of cyberattackers, the unified security operations platform catches cyberthreats at machine speed and protects your organization by automatically disrupting advanced attacks. We are extending this capability to act on third-party signals, for example with SAP signals and alerts. For SIEM customers who have SAP connected, attack disruption will automatically detect financial fraud techniques and disable the native SAP and connected Microsoft Entra account to prevent the cyberattacker from transferring any funds\u2014with no SOC intervention. The attack disruption capabilities will be further strengthened by <a href=\"https:\/\/aka.ms\/MDEIgnite2023\" target=\"_blank\" rel=\"noreferrer noopener\">new deception capabilities in Microsoft Defender for Endpoint<\/a>\u2014which can now automatically generate authentic-looking decoys and lures, so you can entice cyberattackers with fake, valuable assets that will deliver high-confidence, early stage signal to the SOC and trigger automatic attack disruption even faster.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Lastly, <a href=\"https:\/\/aka.ms\/XDRIgnite2023\" target=\"_blank\" rel=\"noreferrer noopener\">we are building on the native XDR experience<\/a> by including cloud workload signals and alerts from Microsoft Defender for Cloud\u2014a leading cloud-native application protection platform (CNAPP)\u2014so analysts can conduct investigations that span across their multicloud infrastructure (Microsoft Azure, Amazon Web Services, and Google Cloud Platform environments) and identities, email and collaboration tools, software as a service (SaaS) apps, and multiplatform endpoints\u2014making Microsoft Defender XDR one of the most comprehensive native XDR platforms in the industry.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Customers who operate both SIEM and XDR can add Microsoft Sentinel into their Microsoft Defender portal experience easily, with no migration required. Existing Microsoft Sentinel customers can continue using the Azure portal. The unified security operations platform is now available in private preview and will move to public preview in 2024.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"expanding-copilot-for-data-security-identity-device-management-and-more\">Expanding Copilot for data security, identity, device management, and more&nbsp;<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Security is a shared responsibility across teams, yet many don\u2019t share the same tools or data\u2014and they often don\u2019t collaborate with one another. We are adding <strong>new capabilities and embedded experiences of Security Copilot across the Microsoft Security portfolio<\/strong> as part of the Early Access Program to empower all security and IT roles to detect and address cyberthreats at machine speed. And to enable all roles to protect against top security risks and drive operational efficiency, <strong>Microsoft Security Copilot <\/strong>now brings together signals across Microsoft Defender, Microsoft Defender for Cloud, Microsoft Sentinel, Microsoft Intune, Microsoft Entra, and Microsoft Purview into a single pane of glass.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"new-capabilities-in-security-copilot-creating-a-force-multiplier-for-security-and-it-teams\">New capabilities in Security Copilot creating a force multiplier for security and IT teams<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-purview\"><strong>Microsoft Purview<\/strong><\/a>:<strong> <\/strong>Data security and compliance teams review a multitude of complex and diverse alerts spread across multiple security tools, each alert containing a wealth of rich insights. To make data protection faster, more effective, and easier, Security Copilot is now embedded in Microsoft Purview, offering summarization capabilities directly within <a href=\"http:\/\/aka.ms\/DLPblog\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Purview Data Loss Prevention<\/a>, <a href=\"http:\/\/aka.ms\/adaptiveprotection\/blog\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Purview Insider Risk Management<\/a>, <a href=\"https:\/\/aka.ms\/eDiscoveryblog\/Ignite23\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Purview eDiscovery<\/a>, and <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-compliance-and-identity\/unleash-the-future-of-communication-compliance-at-microsoft\/ba-p\/3977722\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Purview Communication Compliance workflows<\/a>, making sense of profuse and diverse data, accelerating investigation and response times, and enabling analysts at all levels to complete complex tasks with AI-powered intelligence at their fingertips. Additionally, with AI translator capabilities in eDiscovery, you can use natural language to define search queries, resulting in faster and more accurate search iterations and eliminating the need to use keyword query language.&nbsp;These new data security capabilities are also available now in the Microsoft Security Copilot standalone experience.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-entra\"><strong>Microsoft Entra<\/strong><\/a>: Password-based attacks have increased dramatically in the last year, and new attack techniques are now trying to circumvent multifactor authentication. To strengthen your defenses against identity compromise, <a href=\"https:\/\/aka.ms\/Entra\/Ignite23\" target=\"_blank\" rel=\"noreferrer noopener\">Security Copilot embedded in Microsoft Entra<\/a> can assist in investigating identity risks and help with troubleshooting daily identity tasks, such as why a sign-in required multifactor authentication or why a user\u2019s risk level increased. IT administrators can instantly get a risk summary, steps to remediate, and recommended guidance for each identity at risk, in natural language. Quickly get to the root of an issue for a sign-in with a summarized report of the most relevant information and context. Additionally, in Microsoft Entra ID Governance, admins can use Security Copilot to guide in the creation of a lifecycle workflow to streamline the process of creating and issuing user credentials and access rights. These new capabilities to summarize users and groups, sign-in logs, and high-risk users are also available now in the Microsoft Security Copilot standalone experience.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-intune\"><strong>Microsoft Intune<\/strong><\/a>: The evolving device landscape is driving IT complexity and risk of endpoint vulnerabilities\u2014and IT administrators play a critical security role in managing these devices and protecting organizational data. We are introducing <a href=\"https:\/\/aka.ms\/Intune\/SecurityCopilotEmbedded\" target=\"_blank\" rel=\"noreferrer noopener\">Security Copilot embedded in Microsoft Intune<\/a> in the coming weeks for select customers of the Early Access Program, marking a meaningful advancement in endpoint management and security. This experience offers unprecedented visibility across security data with full device context, provides real-time guidance when creating policies, and empowers security and IT teams to discover and remediate the root cause of device issues faster and easier. Now IT administrators and security analysts are empowered to drive better and informed outcomes with pre-deployment, AI-based guard rails to help them understand the impact of policy changes in their environment before applying them. With Copilot, they can save time and reduce complexity of gathering near real-time device, user, and app data and receive AI-driven recommendations to respond to threats, incidents, and vulnerabilities, fortifying endpoint security.\u202f<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.microsoft.com\/security\/business\/cloud-security\/microsoft-defender-cloud\"><strong>Microsoft Defender for Cloud<\/strong><\/a>: Maintaining a strong cloud security posture is a challenge for cybersecurity teams, as they face siloed visibility into risks and vulnerabilities across the application lifecycle, due to the rise of cloud-native development and multicloud environments. With Security Copilot now embedded in <a href=\"https:\/\/aka.ms\/MDCIgnite2023\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender for Cloud<\/a>, security admins are empowered to identify critical concerns to resources faster with guided risk exploration that summarizes risks, enriched with contextual insights such as critical vulnerabilities, sensitive data, and lateral movement. To address the uncovered critical risks more efficiently, admins can use Security Copilot in Microsoft Defender for Cloud to guide remediation efforts and streamline the implementation of recommendations by generating recommendation summaries, step-by-step remediation actions, and scripts in a preferred language, and directly delegate remediation actions to key resource users. These new cloud security capabilities are also available now in the Microsoft Security Copilot standalone experience.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/aka.ms\/EASMIgnite2023\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Microsoft Defender for External Attack Surface Management<\/strong><\/a><strong> (EASM)<\/strong>:<strong> <\/strong>Keeping up with tracking assets and their vulnerabilities can be overwhelming for security teams, as it requires time, coordination, and research to understand which assets pose a risk to the organization. New Defender for EASM capabilities are available in the Security Copilot standalone experience and enable security teams to quickly gain insights into their external attack surface, regardless of where the assets are hosted, and feel confident in the outcomes. These capabilities provide security operations teams with a snapshot view of their external attack surface, help vulnerability managers understand if their external attack surface is impacted by a particular common vulnerability and exposure (CVE), and provide visibility into vulnerable critical and high priority CVEs to help teams know how pervasive they are to their assets, so they can prioritize remediation efforts.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Custom plugins to trusted third-party tools<\/strong>: Security Copilot provides more robust, enriched insight and guidance when it is integrated with a broader set of security and IT teams&#8217; tools. To do so, Security Copilot must embrace a vast ecosystem of security partners. As part of this effort, we are excited to announce the latest integration now available to Security Copilot customers with ServiceNow. For customers who want to bring onboard their trusted security tools and integrate their own organizational data and applications, we&#8217;re also introducing a new set of custom plugins that will enable them to expand the reach of Security Copilot to new data and new capabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"securing-the-use-of-generative-ai-for-safeguarding-your-organization\">Securing the use of generative AI for safeguarding your organization<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">As organizations quickly adopt generative AI, it is vital to have robust security measures in place to ensure safe and responsible use. This involves understanding how generative AI is being used, protecting the data that is being used or created by generative AI, and governing the use of AI.&nbsp;As generative AI apps become more popular, security teams need tools that secure both the AI applications and the data they interact with. In fact, 43 percent of organizations said lack of controls to detect and mitigate risk in AI is a top concern.<sup>5<\/sup> Different AI applications pose various levels of risk, and organizations need the ability to monitor and control these generative AI apps with varying levels of protection.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Microsoft Defender<\/strong>: Microsoft Defender for Cloud Apps is expanding its discovery capabilities to help organizations gain visibility into the generative AI apps in use, provide extensive protection and control to block risky generative AI apps, and apply ready-to-use customizable policies to prevent data loss in AI prompts and AI responses. This new feature supports more than 400 generative AI apps, and offers an easy way to sift through low- versus high-risk apps.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Microsoft Purview<\/strong>: New capabilities in Microsoft Purview help comprehensively secure and govern data in AI, including Microsoft Copilot and non-Microsoft generative AI applications. Customers can gain visibility into AI activity, including&nbsp;sensitive data usage in AI prompts, comprehensive protection with ready-to-use policies to protect data in AI prompts and responses, and compliance controls to help easily meet business and regulatory requirements. Microsoft Purview capabilities are integrated with Microsoft Copilot, starting with Copilot for Microsoft 365, strengthening the data security and compliance for Copilot for Microsoft 365.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Compliance_and_Purview-1-1024x576.jpg\" alt=\"Microsoft Purview Communication Compliance dashboard detecting business conduct violation.\" class=\"wp-image-132427\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Compliance_and_Purview-1-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Compliance_and_Purview-1-300x169.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Compliance_and_Purview-1-768x432.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Compliance_and_Purview-1-1536x864.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Compliance_and_Purview-1-2048x1152.jpg 2048w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Compliance_and_Purview-1-615x346.jpg 615w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Compliance_and_Purview-1-336x189.jpg 336w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Compliance_and_Purview-1-189x106.jpg 189w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Compliance_and_Purview-1-630x354.jpg 630w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Further, to enable customers to gain a better understanding of which AI applications are being used and how, we are announcing the preview of <a href=\"https:\/\/aka.ms\/PurviewAI\/Blog\" target=\"_blank\" rel=\"noreferrer noopener\">AI hub in Microsoft Purview<\/a>. Microsoft Purview can provide organizations with an aggregated view of total prompts being sent to Copilot and the sensitive information included in those prompts. Organizations can also see an aggregated view of the number of users interacting with Copilot. And we are extending these capabilities to provide insights for more than 100 of the most commonly used consumer generative AI applications, such as ChatGPT, Bard, DALL-E, and more. <\/p>\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture1-4-1024x848.webp\" alt=\"New AI hub in Microsoft Purview portal.\" class=\"wp-image-132361 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture1-4-1024x848.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture1-4-300x248.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture1-4-768x636.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture1-4-1536x1272.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture1-4.webp 1677w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture1-4-1024x848.webp\"><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"expanding-end-to-end-security-for-comprehensive-protection-everywhere\">Expanding end-to-end security for comprehensive protection everywhere<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Keeping up with daily protection requirements is a security challenge that can\u2019t be ignored\u2014and the struggle to stay ahead of cyberattackers and safeguard your organization\u2019s data is why we\u2019ve designed our security features to evolve with the digital threat landscape and provide comprehensive protection against cyberthreats.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Strengthen your code-to-cloud defenses<\/strong> <strong>with Microsoft Defender for Cloud<\/strong>. To cope with the complexity of multicloud environments and cloud-native applications, security teams need a comprehensive strategy that enables <a href=\"https:\/\/aka.ms\/MDCIgnite2023\" target=\"_blank\" rel=\"noreferrer noopener\">code-to-cloud defenses<\/a> on all cloud deployments. For posture management, the preview of Defender for Cloud\u2019s integration with Microsoft Entra Permissions Management helps you apply the least privilege principle for cloud resources and shows the link between access permissions and potential vulnerabilities across Azure, AWS, and Google Cloud. Defender for Cloud also has an improved attack path analysis experience, which helps you predict and prevent complex cloud attacks\u2014and provides more insights into your Kubernetes deployments across Amazon Elastic Kubernetes Service (EKS) and Google Kubernetes Engine (GKE) clusters and APIs insights to prioritize cloud risk remediation. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To strengthen security throughout the application lifecycle, preview of the GitLab Ultimate integration gives you a clear view of your application security posture and simplifies code-to-cloud remediation workflows across all major developer platforms\u2014GitHub, Azure DevOps, and GitLab within Defender for Cloud. Additionally, general availability of Defender for APIs, which offers machine learning-driven protection against API threats and agentless vulnerability assessments for container images in Microsoft Azure Container Registries. Defender for Cloud now offers a unified vulnerability assessment engine spanning all cloud workloads, powered by the strong capabilities of Microsoft Defender Vulnerability Management.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Leverage <strong>Microsoft Defender Threat Intelligence <\/strong>for elevating your threat intelligence. Available in Microsoft Defender XDR, <a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-defender-threat-intelligence\">Microsoft Defender Threat Intelligence<\/a> offers valuable open-source intelligence and internet data sets found nowhere else. These capabilities now enhance Microsoft Defender products with crucial context around threat actors, tooling, and infrastructure at no additional cost to customers. Available in the Threat Intelligence blade of Defender XDR,<strong> Detonation Intelligence <\/strong>enables users to search, look up, and contextualize cyberthreats as well as detonate URLs and view results to quickly understand a malicious file or URL. Defender XDR customers can quickly submit an indicator of compromise (IoC) to immediately view the results. <strong>Vulnerability Profiles <\/strong>put intelligence collected from the Microsoft Threat Intelligence team about vulnerabilities all in one place. Profiles are updated when new information is discovered and contains a description, Common Vulnerability Scoring System scores (CVSS), a priority score, exploits, and deep and dark web chatter observations.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Use <a href=\"http:\/\/aka.ms\/PurviewExpandingHorizons\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Microsoft Purview to extend data protection capabilities<\/strong><\/a><strong> across structured and unstructured data types.<\/strong> In the past, securing and governing sensitive data across these diverse elements of your digital estate would have required multiple providers, adding a heavy integration tax. But today, with Microsoft Purview, you can gain visibility across your entire data estate, secure your structured and unstructured data, and detect risks across clouds. Microsoft Purview\u2019s labeling and classification capabilities are expanding beyond Microsoft 365, offering access controls for both structured and unstructured data types. Users will have the ability to discover, classify, and safeguard sensitive information hosted in structured databases such as Microsoft Azure SQL and Azure Data Lake Storage (ADLS)\u2014also extending these capabilities into Amazon Simple Storage Service (S3) buckets.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Detect insider risk with <a href=\"https:\/\/aka.ms\/insiderriskblog\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Microsoft Purview Insider Risk Management<\/strong><\/a>, which offers ready-to-use risk indicators to detect critical insider risks in Azure, AWS, and SaaS applications, including Box, Dropbox, Google Drive, and GitHub. Admins with appropriate permissions will no longer need to manually cross-reference signals in these environments. They can now utilize the curated and preprocessed indicators to obtain a more holistic view of a potential insider incident.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Simplify access security with Microsoft Entra<\/strong>. Securing access points is critical and can be complex when using multiple providers for identity management, network security, and cloud security. With Microsoft Entra, you can centralize all your access controls together to more fully secure and protect your environment. Microsoft\u2019s <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-security-service-edge-sse\">Security Service Edge<\/a> solution is expanding with several new features.<strong> <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">By the end of 2023, Microsoft Entra Internet Access preview will include context-aware <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-secure-web-gateway-swg\">secure web gateway (SWG)<\/a> capabilities for all internet apps and resources with web content filtering, Conditional Access controls, compliant network check, and source IP restoration.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Microsoft Entra Private Access for private apps and resources has extended protocol support so you can seamlessly transition from your traditional VPN to a modern Zero Trust Network Access (ZTNA) solution, and the ability to add multifactor authentication to all private apps for remote and on-premises users. <\/li>\n\n\n\n<li class=\"wp-block-list-item\">Now with auto-enrollment into Microsoft Entra Conditional Access policies you can enhance security posture and reduce complexity for securing access. Easily create and manage a passkey, a free phishing-resistant credential based on open standards, in the Microsoft Authenticator app for signing into Microsoft Entra ID-managed apps. <\/li>\n\n\n\n<li class=\"wp-block-list-item\">Promote enforcement of least-privilege access for cloud resources with new integrations for Microsoft Entra Permissions Management. Permissions Management has a new integration with ServiceNow that enables organizations to incorporate time-bound access permission requests to existing approval workflows in ServiceNow.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Unify, simplify, and delight users by the Microsoft Intune Suite.<\/strong> We\u2019re adding three new solutions to the Intune Suite, available in February 2024. These solutions further unify critical endpoint management workloads in Intune to fortify device security posture, power better experiences, and simplify IT and security operations end-to-end. We will also be able to offer these solutions coupled with the existing Intune Suite capabilities to agencies and organizations of the Government Community Cloud (GCC) in March 2024.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/aka.ms\/MicrosoftCloudPKI\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Cloud PKI<\/a> offers a comprehensive, cloud-based public key infrastructure and certificate management solution to simply create, deploy, and manage certificates for authentication, Wi-Fi, and VPN endpoint scenarios.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/aka.ms\/IntuneSuite\/EnterpriseApplicationManagement\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Intune Enterprise Application Management<\/a> streamlines third-party app discovery, packaging, deployment, and updates via a secure enterprise catalog to help all workers stay current.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/aka.ms\/IntuneSuite\/AdvancedAnalytics\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Intune Advanced Analytics<\/a> extends the Intune Suite anomaly detection capabilities and provides deep device data insights as well as battery health scoring for administrators to proactively power better, more secure user experiences and productivity improvements.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"partner-opportunities-and-news\">Partner opportunities and news<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">There are several partners participating in our engineer-led Security Copilot <a href=\"https:\/\/aka.ms\/PartnerPrivatePreview\" target=\"_blank\" rel=\"noreferrer noopener\">Partner Private Preview<\/a> to validate usage scenarios and provide feedback on functionality, operations, and APIs to assist with extensibility. If you are joining us in person at Microsoft Ignite, watch the demos at the Customer Meet-up Hub, presented by <a href=\"https:\/\/aka.ms\/MISA\">Microsoft Intelligent Security Association (MISA)<\/a>&nbsp;members sponsoring at Microsoft Ignite. And if you\u2019re a partner interested in staying current, join the <a href=\"https:\/\/forms.microsoft.com\/pages\/responsepage.aspx?id=v4j5cvGGr0GRqy180BHbR7GkZxmcvGdGql1aVgLqRR1UNEk0MTVPVjg1VjhPMUJHVTZETlRXSk1RQy4u\" target=\"_blank\" rel=\"noreferrer noopener\">Security Copilot Partner Interest Community<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture3.jpg\" alt=\"MISA featured member presenting at Microsoft Expert Meetup Hub.\" class=\"wp-image-132231\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture3.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture3-300x168.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture3-768x431.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture3-615x346.jpg 615w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture3-336x189.jpg 336w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture3-189x106.jpg 189w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Picture3-630x354.jpg 630w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"join-us-in-creating-a-more-secure-future\">Join us in creating a more secure future<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Embracing innovation has never been more important for an organization, not only with respect to today\u2019s cyberthreats but also in anticipation of those to come. Recently, to create a more secure future, we launched the <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2023\/11\/02\/secure-future-initiative-sfi-cybersecurity-cyberattacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Secure Future Initiative<\/a>\u2014a new initiative to pursue our next generation of cybersecurity protection.<\/p>\n\n\n\n<div class=\"alignwide is-style-vertical wp-block-bloginabox-theme-promotional\">\n\t\n<div class=\"promotional promotional--has-media promotional--media-right\">\n\t<div class=\"promotional__wrapper\">\n\t\t<div class=\"promotional__content-wrapper\">\n\t\t\t<div class=\"promotional__content\">\n\t\t\t\t\n\n<h2 class=\"wp-block-heading\" id=\"microsoft-ignite-2023\">Microsoft Ignite 2023<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Join Vasu Jakkal and Charlie Bell at Microsoft Ignite to watch &#8220;the Future of Security and AI&#8221; on November 16, 2023, at 10:15 AM PT.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button  is-full-width-on-mobile\"><a data-bi-an=\"Global CTA\" data-bi-ct=\"cta link\" data-bi-id=\"cta-block\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/ignite.microsoft.com\/en-US\/sessions\/6c03cba3-7dcd-4765-b856-047901576143?source=sessions\">Watch the keynote<\/a><\/div>\n<\/div>\n\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"promotional__media-wrapper\">\n\t\t\t\t<div class=\"promotional__media\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1080\" height=\"1080\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Security-Copilot-Perspective-YellowBg-Diagonal-2.jpg\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Security-Copilot-Perspective-YellowBg-Diagonal-2.jpg 1080w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Security-Copilot-Perspective-YellowBg-Diagonal-2-300x300.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Security-Copilot-Perspective-YellowBg-Diagonal-2-1024x1024.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Security-Copilot-Perspective-YellowBg-Diagonal-2-150x150.jpg 150w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/Security-Copilot-Perspective-YellowBg-Diagonal-2-768x768.jpg 768w\" sizes=\"auto, (max-width: 1080px) 100vw, 1080px\" \/>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">AI is changing our world forever. It is empowering us to achieve the impossible and it will usher in a new era of security that favors security teams. Microsoft is privileged to be a leader in this effort and committed to a vision of security for all. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions, visit our&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\">Microsoft Security<\/a>) and X (formerly known as Twitter) (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>1<\/sup><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023\">Microsoft Digital Defense Report 2023<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>2<\/sup><a href=\"https:\/\/cybersecurityventures.com\/cybercrime-damage-costs-10-trillion-by-2025\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybercrime To Cost The World $10.5 Trillion Annually By 2025<\/a>, Cybercrime Magazine. November 13, 2020.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>3<\/sup><a href=\"https:\/\/media.isc2.org\/-\/media\/Project\/ISC2\/Main\/Media\/documents\/research\/ISC2-Cybersecurity-Workforce-Study-2022.pdf?rev=1bb9812a77c74e7c9042c3939678c196\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity Workforce Study<\/a>, ISC<sup>2<\/sup>. 2022.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>4<\/sup><a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=4648700\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security Copilot randomized controlled trial conducted by Microsoft Office of the Chief Economist<\/a>, November 2023.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>5<\/sup><a href=\"https:\/\/info.microsoft.com\/ww-landing-data-security-index.html?lcid=en-us\" target=\"_blank\" rel=\"noreferrer noopener\">Data Security Index: Trends, insights, and strategies to secure data<\/a>, Microsoft. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new era of AI is here. At Microsoft Ignite, we will be announcing new cybersecurity capabilities to help you thrive in this new age. Explore our big announcements.<\/p>\n","protected":false},"author":114,"featured_media":132301,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[],"threat-intelligence":[],"content-type":[3660,3662],"job-role":[],"product":[3690,3691,3698,3693,3702,3703,4140,4137,4138,3710,3719,3726],"topic":[3664,4236,3683,3684,3685],"coauthors":[2400],"class_list":["post-131380","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-events","content-type-news","product-microsoft-defender","product-microsoft-defender-for-cloud","product-microsoft-defender-threat-intelligence","product-microsoft-defender-xdr","product-microsoft-entra","product-microsoft-entra-id","product-microsoft-entra-id-governance","product-microsoft-entra-internet-access","product-microsoft-entra-private-access","product-microsoft-purview","product-microsoft-security-copilot","product-microsoft-sentinel","topic-ai-and-machine-learning","topic-secure-future-initiative","topic-security-management","topic-security-operations","topic-siem-and-xdr","review-flag-1694638271-781","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-3-1694638266-241","review-flag-4-1694638266-512","review-flag-5-1694638266-171","review-flag-ai-driven-ai-driven","review-flag-disable","review-flag-gener-1694638270-216","review-flag-integ-1694638263-281","review-flag-lever-1694638263-909","review-flag-machi-1694638272-641","review-flag-never-1694638263-791","review-flag-new-1694638263-340","review-flag-partn-1694638263-177","review-flag-percent","review-flag-priva-1694638270-654","review-flag-publi-1694638270-243"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Future of security with AI: Microsoft Ignite | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"Microsoft unveils AI for security and security for AI at Microsoft Ignite 2023. Explore these big announcements.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Future of security with AI: Microsoft Ignite | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Microsoft unveils AI for security and security for AI at Microsoft Ignite 2023. Explore these big announcements.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-15T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-07T22:51:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/SCI-Embrace-The-New-Era-with-AI-Ignite-SocialMedia-R6-rm-BlogBanner11-13-1280x720-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1291\" \/>\n\t<meta property=\"og:image:height\" content=\"729\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Vasu Jakkal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/SCI-Embrace-The-New-Era-with-AI-Ignite-SocialMedia-R6-rm-BlogBanner11-13-1280x720-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vasu Jakkal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"19 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/vasu-jakkal\/\",\"@type\":\"Person\",\"@name\":\"Vasu Jakkal\"}],\"headline\":\"Microsoft unveils expansion of AI for security and security for AI at Microsoft Ignite\",\"datePublished\":\"2023-11-15T16:00:00+00:00\",\"dateModified\":\"2025-08-07T22:51:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/\"},\"wordCount\":3949,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/SCI-Embrace-The-New-Era-with-AI-Ignite-SocialMedia-R6-rm-BlogBanner11-13-1280x720-1.webp\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/\",\"name\":\"Future of security with AI: Microsoft Ignite | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/SCI-Embrace-The-New-Era-with-AI-Ignite-SocialMedia-R6-rm-BlogBanner11-13-1280x720-1.webp\",\"datePublished\":\"2023-11-15T16:00:00+00:00\",\"dateModified\":\"2025-08-07T22:51:31+00:00\",\"description\":\"Microsoft unveils AI for security and security for AI at Microsoft Ignite 2023. Explore these big announcements.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/SCI-Embrace-The-New-Era-with-AI-Ignite-SocialMedia-R6-rm-BlogBanner11-13-1280x720-1.webp\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/SCI-Embrace-The-New-Era-with-AI-Ignite-SocialMedia-R6-rm-BlogBanner11-13-1280x720-1.webp\",\"width\":1291,\"height\":729,\"caption\":\"Microsoft Ignite 2023.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft unveils expansion of AI for security and security for AI at Microsoft Ignite\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/896288e163b34e5234362f575a24804a\",\"name\":\"Veronica Sun\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/cd9a22a893ee345a1fd4ffe40f8485bf0cb61d3356a7a177cab3766875297d93?s=96&d=microsoft&r=gf70f3dcf7b9a6e912e461df77b1366b0\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd9a22a893ee345a1fd4ffe40f8485bf0cb61d3356a7a177cab3766875297d93?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd9a22a893ee345a1fd4ffe40f8485bf0cb61d3356a7a177cab3766875297d93?s=96&d=microsoft&r=g\",\"caption\":\"Veronica Sun\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/veronicasun\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Future of security with AI: Microsoft Ignite | Microsoft Security Blog","description":"Microsoft unveils AI for security and security for AI at Microsoft Ignite 2023. Explore these big announcements.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/","og_locale":"en_US","og_type":"article","og_title":"Future of security with AI: Microsoft Ignite | Microsoft Security Blog","og_description":"Microsoft unveils AI for security and security for AI at Microsoft Ignite 2023. Explore these big announcements.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/","og_site_name":"Microsoft Security Blog","article_published_time":"2023-11-15T16:00:00+00:00","article_modified_time":"2025-08-07T22:51:31+00:00","og_image":[{"width":1291,"height":729,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/SCI-Embrace-The-New-Era-with-AI-Ignite-SocialMedia-R6-rm-BlogBanner11-13-1280x720-1.png","type":"image\/png"}],"author":"Vasu Jakkal","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/SCI-Embrace-The-New-Era-with-AI-Ignite-SocialMedia-R6-rm-BlogBanner11-13-1280x720-1.png","twitter_misc":{"Written by":"Vasu Jakkal","Est. reading time":"19 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/vasu-jakkal\/","@type":"Person","@name":"Vasu Jakkal"}],"headline":"Microsoft unveils expansion of AI for security and security for AI at Microsoft Ignite","datePublished":"2023-11-15T16:00:00+00:00","dateModified":"2025-08-07T22:51:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/"},"wordCount":3949,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/SCI-Embrace-The-New-Era-with-AI-Ignite-SocialMedia-R6-rm-BlogBanner11-13-1280x720-1.webp","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/","name":"Future of security with AI: Microsoft Ignite | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/SCI-Embrace-The-New-Era-with-AI-Ignite-SocialMedia-R6-rm-BlogBanner11-13-1280x720-1.webp","datePublished":"2023-11-15T16:00:00+00:00","dateModified":"2025-08-07T22:51:31+00:00","description":"Microsoft unveils AI for security and security for AI at Microsoft Ignite 2023. Explore these big announcements.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/SCI-Embrace-The-New-Era-with-AI-Ignite-SocialMedia-R6-rm-BlogBanner11-13-1280x720-1.webp","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/11\/SCI-Embrace-The-New-Era-with-AI-Ignite-SocialMedia-R6-rm-BlogBanner11-13-1280x720-1.webp","width":1291,"height":729,"caption":"Microsoft Ignite 2023."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft unveils expansion of AI for security and security for AI at Microsoft Ignite"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/896288e163b34e5234362f575a24804a","name":"Veronica Sun","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cd9a22a893ee345a1fd4ffe40f8485bf0cb61d3356a7a177cab3766875297d93?s=96&d=microsoft&r=gf70f3dcf7b9a6e912e461df77b1366b0","url":"https:\/\/secure.gravatar.com\/avatar\/cd9a22a893ee345a1fd4ffe40f8485bf0cb61d3356a7a177cab3766875297d93?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd9a22a893ee345a1fd4ffe40f8485bf0cb61d3356a7a177cab3766875297d93?s=96&d=microsoft&r=g","caption":"Veronica Sun"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/veronicasun\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/131380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/114"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=131380"}],"version-history":[{"count":4,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/131380\/revisions"}],"predecessor-version":[{"id":141677,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/131380\/revisions\/141677"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/132301"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=131380"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=131380"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=131380"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=131380"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=131380"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=131380"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=131380"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=131380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}