We think cyber crime will be about a $6 trillion business by 2022.
And what we're seeing is these folks ae sharing tool kits online.
I could go online, pay $500, buy a tool kit that simply could let me do a low level hack.
I get a full software license agreement with it.
I get 24 over 7 support and I get updates so think about the casual hacker entering into the hacking business because it is business right, We're seeing the threat actors also sharing information sharing intelligence and if there is a major breach they take the assets that they want, So let's say they had a breach they want to steal a bunch of you know credentials Username and password because they wanna hack into an environment, but they sell everything that they don't use.
So they're monetizing the gains of their crime also, it's a really scary state.
We have been able to actually detect and block Previously unknown malware in milliseconds because we expect the the malware to behave in a certain manner.
So, if we could actually learn use machine learning to take those many threats, we get down to like a smaller set of threats and then use AI to do modeling and say, This isn't behaving as expected.
This is actually behave this malware, we can block it.
We do public private threat sharing.
We do private private threat sharing.
We have the Microsoft Intelligent Security Alliance where we actually have 70 peer companies that we're sharing with and that is growing.
Those include competitors because it is an ecosystem.
We And cyber security is not gonna better unless we all get better right, we all have to be better at this,
Defending democracy, not only Gibbs can pay, or seen across the world.
Best practices that they can use, cuz we do a lot of education.
These folks are out busy, running their campaign.
They're thinking about fundraising, they're thinking about messaging, they're thinking about maybe what policy they're gonna write.
They're not necessarily the most sophisticated people thinking about how they're gonna secure their own organization.
So we spend a lot of a lot of time doing education.
We also spent a lot of time doing tooling and things like MFA, monitoring, looking for threat actors and the account guard tooling.
5G small cell sites are very different from 4G towers
What would it take for you to reveal your data to save others?
First take: WatchOS 7 public beta
Now What: How to plan for the next six months of remote work
TikTok ban: What you need to know
How Black Girls Code is driving change in the tech industry
CISA director: Paper record key to keeping 2020 election secure
Blackhat 2020: Tech community must help secure elections