{"id":11525,"date":"2018-04-04T06:00:39","date_gmt":"2018-04-04T13:00:39","guid":{"rendered":"https:\/\/blogs.msdn.microsoft.com\/azuregov\/?p=11525"},"modified":"2019-03-11T14:01:37","modified_gmt":"2019-03-11T22:01:37","slug":"new-ebook-on-strengthening-cybersecurity-for-the-dod","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/azuregov\/new-ebook-on-strengthening-cybersecurity-for-the-dod\/","title":{"rendered":"New eBook on strengthening cybersecurity for the DoD"},"content":{"rendered":"<p><a href=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/43\/2019\/03\/iStock-810869000_super.jpg\"><img decoding=\"async\" class=\"alignnone wp-image-11585\" src=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/43\/2019\/03\/iStock-810869000_super-1024x503.jpg\" alt=\"\" width=\"653\" height=\"321\" \/><\/a><\/p>\n<p>The rapid evolution of technology and the exploitation of data, machine intelligence, and on-demand computing power is changing the requirements of cybersecurity. Fortunately, the tools available to the DoD are changing, too.<\/p>\n<p>Despite improvements in defensive capabilities, prevailing research still shows that, on average, it takes agencies more than 200 days to detect a significant breach. Destructive cyberattacks, insider threats, and third-party dependencies have become a real threat to critical infrastructure, supply chains, and, potentially, to life safety.<\/p>\n<p>In the face of increasingly complex attack methods and the growing expense of attack clean-ups, agencies need to understand the value of working with a leading cloud security partner to protecting sensitive assets from cyberthreats.<\/p>\n<p>What are the benefits of a leading cloud service provider?<\/p>\n<ul>\n<li><strong>Big data threat analysis<\/strong>. As many large cloud providers host millions of servers, they can offer more extensive advanced threat analysis and monitoring than any on-premises capability.<\/li>\n<li><strong>Secure facilities<\/strong>. Cloud service providers specialize in keeping data safe both physically through secure facilities and virtually through in-built encryption, retaining highly skilled personnel to do so.<\/li>\n<li><strong>Modern platforms<\/strong>. Cloud service providers continually update and patch their platforms, without effect on customer workloads.<\/li>\n<li><strong>Auditing<\/strong>. Cloud service providers subject their platforms to thorough and frequent auditing to protect against flaws in their security posture.<\/li>\n<\/ul>\n<p>Learn more about the importance of choosing the right cloud security partner:<\/p>\n<p><a href=\"https:\/\/azure.microsoft.com\/resources\/strengthening-cybersecurity-for-the-department-of-defense\/\"><img decoding=\"async\" class=\"alignleft wp-image-11535 \" src=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/43\/2019\/03\/eBook-Image-232x300.png\" alt=\"\" width=\"98\" height=\"127\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/azure.microsoft.com\/resources\/strengthening-cybersecurity-for-the-department-of-defense\/\">Strengthening cybersecurity for the Department of Defense (eBook)<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>We welcome your comments and suggestions to help us improve your Azure Government experience. To stay up to date on all things Azure Government, be sure to subscribe to our <a href=\"https:\/\/blogs.msdn.microsoft.com\/azuregov\/feed\/\">RSS feed<\/a> and to receive emails by clicking \u201cSubscribe by Email!\u201d on the <a href=\"https:\/\/blogs.msdn.microsoft.com\/azuregov\/\">Azure Government Blog<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The rapid evolution of technology and the exploitation of data, machine intelligence, and on-demand computing power is changing the requirements of cybersecurity. Fortunately, the tools available to the DoD are changing, too.<\/p>\n","protected":false},"author":1804,"featured_media":17139,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[31],"tags":[95,178,184,216,262,268,316,537],"class_list":["post-11525","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-thought-leadership","tag-azure-government","tag-cloud-security","tag-cloud-strategy","tag-cybersecurity","tag-dod","tag-ebook","tag-government-cloud","tag-strengthening-cybersecurity-for-the-department-of-defense"],"acf":[],"blog_post_summary":"<p>The rapid evolution of technology and the exploitation of data, machine intelligence, and on-demand computing power is changing the requirements of cybersecurity. Fortunately, the tools available to the DoD are changing, too.<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts\/11525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/users\/1804"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/comments?post=11525"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts\/11525\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/media\/17139"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/media?parent=11525"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/categories?post=11525"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/tags?post=11525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}