Moving from lists to graph protection
The company is also looking for ways to help enterprises secure their own systems with tools such as Microsoft Security Exposure Management, which is now generally available.
This aims to transform security through graph-based posture management rather than list-based protection, mapping the changing relationships between underlying assets such as identities, credentials, permissions, files, devices, and other connections in enterprises.
“Traditional vulnerability management is no longer sufficient,” said Brjann Brekkan, Microsoft’s director of product marketing for security posture and exposure management, in a statement shared with CSOonline. “While patching every potential weakness might seem like a solution, it’s neither practical nor effective. Instead, modern security strategies must focus on the exposures that are easiest for attackers to exploit, prioritizing vulnerabilities that present the greatest risk.”