{"id":90473,"date":"2020-01-29T09:00:00","date_gmt":"2020-01-29T17:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90473"},"modified":"2023-05-15T22:58:07","modified_gmt":"2023-05-16T05:58:07","slug":"afternoon-cyber-tea-state-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/29\/afternoon-cyber-tea-state-of-cybersecurity\/","title":{"rendered":"Afternoon Cyber Tea\u2014The State of Cybersecurity: How did we get here? What does it mean?"},"content":{"rendered":"
Every year the number and scale of cyberattacks grows. Marc Goodman, a global security strategist, futurist, and author of the book, Future Crimes: Everything is Connected, Everyone is Vulnerable, and What We Can Do About It<\/em><\/a>, thinks a lot about how we got here and what it means, which is why he was invited to be the first guest on my podcast series, Afternoon Cyber Tea with Ann Johnson<\/a>.<\/p>\n Marc has a long history in law enforcement, starting as a police officer in Los Angeles and more recently as a consultant to Interpol, The United Nations, NATO, the U.S. Federal Government, and local U.S. law enforcement. His background and experience give him a shrewd perspective on the threats that governments and businesses face now and in the future.<\/p>\n In our conversation, Marc and I discussed what drives cyberattack numbers to climb every year and why data is a risk factor. We also peered into the future and examined some of the threats that businesses and governments should begin preparing for now. Did you know that today the average household has at least 15 connected devices? That number is expected to rapidly grow to 50. We talked about what a truly connected world means for defenders. I really appreciate the way Marc was able to humanize the risks associated with the Internet of Things (IoT).<\/p>\n Most importantly we identified steps, such as Multi-Factor Authentication (MFA)<\/a> and passwordless technology<\/a>, that organizations can take to mitigate these threats. I hope you will take a moment to listen in on our conversation. Listen to the first episode of Afternoon Cyber Tea with Ann Johnson on Apple Podcasts<\/a> or Podcast One<\/a>.<\/p>\n In this important cyber series, I\u2019ll talk with cybersecurity influencers about trends shaping the threat landscape and explore the risk and promise of systems powered by artificial intelligence (AI), IoT, and other emerging tech.<\/p>\n You can listen to Afternoon Cyber Tea with Ann Johnson on:<\/strong><\/p>\n Also bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity. Or reach out to me on\u00a0LinkedIn<\/a>\u00a0or\u00a0Twitter<\/a>\u00a0if you have guest or topic suggestions.<\/p>\n","protected":false},"excerpt":{"rendered":" Listen to Ann Johnson discuss the scale of cyber threats\u2014past, present, and future\u2014with security strategist, Marc Goodman on her new podcast, Afternoon Cyber Tea.<\/p>\n","protected":false},"author":96,"featured_media":90523,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"content-type":[3660],"topic":[3664,3678],"products":[],"threat-intelligence":[],"tags":[3822,3809],"coauthors":[1849],"class_list":["post-90473","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-events","topic-ai-and-machine-learning","topic-multifactor-authentication","tag-microsoft-security-insights","tag-security-strategies"],"yoast_head":"\nWhat\u2019s next<\/h3>\n
\n