{"id":19804,"date":"2016-07-28T11:50:38","date_gmt":"2016-07-28T10:50:38","guid":{"rendered":"https:\/\/aidanfinn.com\/?p=19804"},"modified":"2016-07-28T11:53:24","modified_gmt":"2016-07-28T10:53:24","slug":"webinar-recording-defending-todays-threats-with-tomorrows-security-by-microsoft","status":"publish","type":"post","link":"https:\/\/aidanfinn.com\/?p=19804","title":{"rendered":"Webinar Recording: Defending Today&rsquo;s Threats With Tomorrow&rsquo;s Security By Microsoft"},"content":{"rendered":"<p>MicroWarehouse has <a href=\"http:\/\/www.mwh.ie\/the-way-that-you-have-been-implementing-it-security-for-the-last-20-years-does-not\" target=\"_blank\">posted<\/a> the recording of our last webinar, which explained why the security solutions of the 1990s that some companies are still relying on, are being easily defeated by attackers today.<\/p>\n<p>The post explains what is happening now, based on 2015 survey information from multiple sources. And I explain how a number of cloud-based security services from Microsoft can protect both your on-premises and cloud infrastructures from these modern attack methods, that your firewall and anti-malware scanning will let pass right through or never see.<\/p>\n<p>In fact, I just saw a support request on a security issue that 2 of the solutions in this webinar would have <em>prevented<\/em>.<\/p>\n<p><a href=\"http:\/\/www.mwh.ie\/the-way-that-you-have-been-implementing-it-security-for-the-last-20-years-does-not\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; float: none; padding-top: 0px; padding-left: 0px; margin-left: auto; display: block; padding-right: 0px; margin-right: auto; border: 0px;\" title=\"image\" src=\"https:\/\/aidanfinn.com\/wp-content\/uploads\/2016\/07\/image62.png\" alt=\"image\" width=\"350\" height=\"198\" border=\"0\" \/><\/a><\/p>\n<p>We have also shared the slides and a hand-out with some follow-up reading\/watching.<\/p>\n<div id=\"scid:77ECF5F8-D252-44F5-B4EB-D463C5396A79:3cb3b77c-970e-4c4d-a6e9-0057846a0667\" class=\"wlWriterEditableSmartContent\" style=\"float: none; margin: 0px; display: inline; padding: 0px;\">Technorati Tags: <a href=\"http:\/\/technorati.com\/tags\/Event+Notes\" rel=\"tag\">Event Notes<\/a>,<a href=\"http:\/\/technorati.com\/tags\/Security\" rel=\"tag\">Security<\/a>,<a href=\"http:\/\/technorati.com\/tags\/EMS\" rel=\"tag\">EMS<\/a>,<a href=\"http:\/\/technorati.com\/tags\/Azure\" rel=\"tag\">Azure<\/a>,<a href=\"http:\/\/technorati.com\/tags\/Active+Directory\" rel=\"tag\">Active Directory<\/a>,<a href=\"http:\/\/technorati.com\/tags\/Azure+AD\" rel=\"tag\">Azure AD<\/a>,<a href=\"http:\/\/technorati.com\/tags\/Office+365\" rel=\"tag\">Office 365<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>MicroWarehouse has posted the recording of our last webinar, which explained why the security solutions of the 1990s that some companies are still relying on, are being easily defeated by attackers today. The post explains what is happening now, based on 2015 survey information from multiple sources. And I explain how a number of cloud-based &hellip; <a href=\"https:\/\/aidanfinn.com\/?p=19804\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Webinar Recording: Defending Today&rsquo;s Threats With Tomorrow&rsquo;s Security By Microsoft&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":18463,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[14],"tags":[169,170,155,150,176,81,190],"class_list":["post-19804","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eventnotes","tag-active-directory","tag-azure","tag-azure-ad","tag-ems","tag-eventnotes","tag-office-365","tag-security"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/aidanfinn.com\/wp-content\/uploads\/2015\/06\/18709586962_42498a806f_z.jpg","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts\/19804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=19804"}],"version-history":[{"count":4,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts\/19804\/revisions"}],"predecessor-version":[{"id":19808,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts\/19804\/revisions\/19808"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/media\/18463"}],"wp:attachment":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=19804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=19804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=19804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}