{"id":2495,"date":"2025-11-25T16:07:37","date_gmt":"2025-11-25T16:07:37","guid":{"rendered":"https:\/\/clouddirect.net\/learning-hub\/?p=2495"},"modified":"2025-11-25T16:07:38","modified_gmt":"2025-11-25T16:07:38","slug":"cyber-security-battleground","status":"publish","type":"post","link":"https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/","title":{"rendered":"The new cyber security battleground"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\" id=\"h-key-takeaways-from-the-microsoft-digital-defence-report-written-by-leon-godwin\"><em>Key takeaways from the Microsoft Digital Defence Report, written by <a href=\"https:\/\/www.linkedin.com\/in\/leongodwin\/\" target=\"_blank\" rel=\"noreferrer noopener\">Leon Godwin<\/a><\/em><\/h3>\n\n<p>We drew inspiration from the Churchill War Rooms to host our latest Security Briefing \u2013 a venue where strategic defence decisions once shaped our history, and now where security professionals learned from Cloud Direct and Microsoft about the new cyber landscape being shaped by AI-driven threats.\u00a0<\/p>\n\n<p>To paraphrase Winston Churchill: \u201c<strong><em>Never before in the field of digital defence has the security of so many relied so heavily on the vigilance of so few<\/em><\/strong>.\u201d\u00a0The battleground consists of intelligence, speed, and resilience, and adversaries are using AI-powered attacks to rapidly infiltrate and compromise organisations, faster than human-based defences can respond.\u00a0<\/p>\n\n<p>From a day in the life of a modern CISO through attack simulations, to insights from Microsoft\u2019s <a href=\"https:\/\/www.linkedin.com\/in\/aileen-f-a29a2a1\/\" target=\"_blank\" rel=\"noreferrer noopener\">Aileen Finlay<\/a> and concrete steps that you can take to adjust to the new threats, I&#8217;ll reflect on the event and share my take on the newly released Microsoft Digital Defence Report 2025.\u00a0<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-the-reality-on-the-ground\"><strong>The reality on the ground<\/strong><\/h2>\n\n<p>On 13 October, the UK government took the unprecedented step of sending a <a href=\"https:\/\/www.gov.uk\/government\/publications\/ministerial-letter-on-cyber-security-to-leading-uk-companies\" target=\"_blank\" rel=\"noreferrer noopener\">letter out to all UK businesses<\/a> to highlight the significance of new cyber threats. The letter\u2019s goal was to fundamentally reclassify cyber security from a technical operational task to a critical board-level imperative. By issuing a direct mandate, the government signaled that the intense and sophisticated nature of modern threats now constitutes a primary risk to national economic stability. \u00a0<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-the-m-icro-soft-digital-defence-report-nbsp\"><strong>The M<\/strong><strong>icro<\/strong><strong>soft Digital Defence Report<\/strong><strong><\/strong>&nbsp;<\/h3>\n\n<p>The recent release of\u00a0the <a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\">Microsoft Digital Defence Report<\/a> makes it clear why the UK government is so concerned, and why you should be too.\u00a0<\/p>\n\n<p>The threat landscape isn\u2019t just evolving \u2013 it\u2019s accelerating. Attacks are more aggressive, more organised, and frankly, more relentless than ever. The UK is now ranked number two in the global index of countries most impacted by cyber threats.\u00a0<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-defence-report-takeaways-for-the-modern-ciso\"><strong>Defence Report takeaways for the Modern CISO<\/strong>\u00a0<\/h2>\n\n<p>One theme that kept coming up during the event was the \u201c<strong>prevention versus response<\/strong>\u201d paradigm, or what the military calls \u201cLeft of Bang\u201d and \u201cRight of Bang.\u201d The Microsoft Digital Defence Report 2025 makes it clear; you can\u2019t choose one over the other. You need both.\u00a0<\/p>\n\n<p>Here\u2019s a breakdown of the key findings of the report, and actions to take off the back of it. \u00a0<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-1-identity-is-the-battleground-nbsp\"><strong>1. Identity is the Battleground&nbsp;<\/strong><\/h3>\n\n<p><strong>Problem:<\/strong> Attackers aren\u2019t only breaking in, they\u2019re logging in. Identity compromise is still the number one entry point for ransomware and data theft, and it\u2019s getting smarter.&nbsp;When you login to a computer you gate a token that is your permission to use that session for a period of time before you need to reauthenticate. Token theft and Adversary-in-the-Middle (AiTM) attacks are on the rise, bypassing traditional protections. Your traditional Multi-Factor Authentication (MFA) that secured you for many years is now simply\u202fnot enough.&nbsp;<\/p>\n\n<p><strong>Solution:<\/strong> Phishing-resistant MFA is the gold standard.&nbsp;<\/p>\n\n<p><strong>Action:<\/strong>&nbsp;<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Audit your Entra ID environment today.&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Enforce <strong>phishing-resistant MFA<\/strong> for everyone, especially admins.&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Update legacy authentication protocols.<\/li>\n<\/ul>\n\n<p><strong>Impact:<\/strong> <strong>Phishing-resistant MFA blocks over 99% of unauthorised access attempts<\/strong>, according to the Microsoft report. If you do one thing this quarter, make it updating your systems from traditional MFA to phishing-resistant MFA.&nbsp;<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-2-the-double-edged-sword-of-ai-nbsp\"><strong>2. The Double-Edged Sword of AI<\/strong>&nbsp;<\/h3>\n\n<p><strong>Problem:<\/strong> AI isn\u2019t just our friend, it\u2019s the attacker\u2019s too. They\u2019re using it to craft convincing phishing lures, scale attacks, and even create deepfakes for fraud.&nbsp;<\/p>\n\n<p><strong>Solution:<\/strong> We fight fire with fire. AI-driven defence can now contain breaches in seconds, suspending compromised accounts before a human is aware of an issue. This is helped further now that Microsoft Copilot has been bundled into the M365 E5 licenses, rather than an expensive bolt-on.&nbsp;<\/p>\n\n<p><strong>Action:<\/strong>&nbsp;<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Put an AI governance framework in place.&nbsp;ISO 42001 is a great starting point. &nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Deploy AI-powered tools like Copilot for Security, Microsoft Sentinel, and Defender XDR to automate detection and response.&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>You already have access to the phishing simulations within your M365 subscriptions, you should increase the schedule to be at least weekly.&nbsp;<\/li>\n<\/ul>\n\n<p><strong>Impact:<\/strong> Moving from reactive to proactive defence shrinks dwell time, improves awareness, and limits the blast radius of an attack.&nbsp;<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-3-cyber-risk-is-business-risk-nbsp\"><strong>3. Cyber Risk is Business Risk<\/strong>&nbsp;<\/h3>\n\n<p><strong>Problem:<\/strong> Too often, security is treated as an IT issue. But as we see in the examination of real-world breaches, it doesn\u2019t just impact systems. It&#8217;s effecting revenue, supply chains and reputation. In one case this resulted in liquidation of the business and termination of it\u2019s 700 employees. &nbsp;<\/p>\n\n<p><strong>Solution:<\/strong> Security needs a seat at the boardroom table.&nbsp;<\/p>\n\n<p><strong>Action:<\/strong>&nbsp;<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Build reports with metrics that matter including, MFA coverage, patch latency, incident response times. &nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Run tabletop roleplaying exercises so your executive team knows what to do when, not if, the breach happens.&nbsp;<\/li>\n<\/ul>\n\n<p><strong>Impact:<\/strong> A resilient culture means the business keeps moving, even when attackers try to stop it.&nbsp;<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-what-you-can-do-next\"><strong>What you can do next<\/strong>\u00a0<\/h2>\n\n<p>The MDDR 2025 isn\u2019t just a collection of scary stats, it\u2019s a wake-up call.&nbsp;<\/p>\n\n<p>If you\u2019re planning your 2026 roadmap and wondering how to prioritise (or fund) these improvements, let\u2019s talk. We can help secure funding for assessments to pinpoint your weakest links and help provide guidance on your security journey. &nbsp;<\/p>\n\n<p>Don\u2019t wait for the breach to happen. Build resilience now. <\/p>\n\n<p>Sign up to one of our Security Innovation consultancy sessions. These sessions are designed to help you with your specific business challenges&nbsp;&nbsp;<\/p>\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-fill\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color has-medium-font-size has-custom-font-size wp-element-button\" href=\"https:\/\/clouddirect.net\/workshops\/security\/\" style=\"border-radius:0px;background-color:#279bbb\">Book a 1:1 security consultancy<\/a><\/div>\n<\/div>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Key takeaways from the Microsoft Digital Defence Report, written by Leon Godwin We drew inspiration from the Churchill War Rooms to host our latest Security Briefing \u2013 a venue where strategic defence decisions once shaped our history, and now where security professionals learned from Cloud Direct and Microsoft about the new cyber landscape being shaped [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":2497,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[31],"tags":[66],"post_media_type":[24],"class_list":["post-2495","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-security","tag-microsoft-security","post_media_type-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>New Cyber Security Battleground: Insights from Microsoft<\/title>\n<meta name=\"description\" content=\"Discover how intelligence, speed, and resilience are reshaping cybersecurity in the age of AI-powered threats. Explore key findings from the Microsoft Digital Defence Report 2025. Learn how to build a resilient defence strategy and stay ahead of evolving threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The new cyber security battleground\" \/>\n<meta property=\"og:description\" content=\"Discover how intelligence, speed, and resilience are reshaping cybersecurity in the age of AI-powered threats. Explore key findings from the Microsoft Digital Defence Report 2025. Learn how to build a resilient defence strategy and stay ahead of evolving threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/\" \/>\n<meta property=\"og:site_name\" content=\"Learning Hub\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-25T16:07:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-25T16:07:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2025\/11\/Micorsoft-Cyber-Security-Header-Image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"abbieantoine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"abbieantoine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/cyber-security-battleground\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/cyber-security-battleground\\\/\"},\"author\":{\"name\":\"abbieantoine\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#\\\/schema\\\/person\\\/74dbe97225c05374d42d142cdc1d2a28\"},\"headline\":\"The new cyber security battleground\",\"datePublished\":\"2025-11-25T16:07:37+00:00\",\"dateModified\":\"2025-11-25T16:07:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/cyber-security-battleground\\\/\"},\"wordCount\":927,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/cyber-security-battleground\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/11\\\/Micorsoft-Cyber-Security-Header-Image.png\",\"keywords\":[\"Microsoft Security\"],\"articleSection\":[\"Microsoft Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/cyber-security-battleground\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/cyber-security-battleground\\\/\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/cyber-security-battleground\\\/\",\"name\":\"New Cyber Security Battleground: Insights from Microsoft\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/cyber-security-battleground\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/cyber-security-battleground\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/11\\\/Micorsoft-Cyber-Security-Header-Image.png\",\"datePublished\":\"2025-11-25T16:07:37+00:00\",\"dateModified\":\"2025-11-25T16:07:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#\\\/schema\\\/person\\\/74dbe97225c05374d42d142cdc1d2a28\"},\"description\":\"Discover how intelligence, speed, and resilience are reshaping cybersecurity in the age of AI-powered threats. Explore key findings from the Microsoft Digital Defence Report 2025. Learn how to build a resilient defence strategy and stay ahead of evolving threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/cyber-security-battleground\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/cyber-security-battleground\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/cyber-security-battleground\\\/#primaryimage\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/11\\\/Micorsoft-Cyber-Security-Header-Image.png\",\"contentUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/11\\\/Micorsoft-Cyber-Security-Header-Image.png\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/cyber-security-battleground\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The new cyber security battleground\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#website\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/\",\"name\":\"Learning Hub\",\"description\":\"Cloud Direct\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#\\\/schema\\\/person\\\/74dbe97225c05374d42d142cdc1d2a28\",\"name\":\"abbieantoine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g\",\"caption\":\"abbieantoine\"},\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/author\\\/abbiefawcett\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"New Cyber Security Battleground: Insights from Microsoft","description":"Discover how intelligence, speed, and resilience are reshaping cybersecurity in the age of AI-powered threats. Explore key findings from the Microsoft Digital Defence Report 2025. Learn how to build a resilient defence strategy and stay ahead of evolving threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/","og_locale":"en_GB","og_type":"article","og_title":"The new cyber security battleground","og_description":"Discover how intelligence, speed, and resilience are reshaping cybersecurity in the age of AI-powered threats. Explore key findings from the Microsoft Digital Defence Report 2025. Learn how to build a resilient defence strategy and stay ahead of evolving threats.","og_url":"https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/","og_site_name":"Learning Hub","article_published_time":"2025-11-25T16:07:37+00:00","article_modified_time":"2025-11-25T16:07:38+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2025\/11\/Micorsoft-Cyber-Security-Header-Image.png","type":"image\/png"}],"author":"abbieantoine","twitter_card":"summary_large_image","twitter_misc":{"Written by":"abbieantoine","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/#article","isPartOf":{"@id":"https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/"},"author":{"name":"abbieantoine","@id":"https:\/\/clouddirect.net\/learning-hub\/#\/schema\/person\/74dbe97225c05374d42d142cdc1d2a28"},"headline":"The new cyber security battleground","datePublished":"2025-11-25T16:07:37+00:00","dateModified":"2025-11-25T16:07:38+00:00","mainEntityOfPage":{"@id":"https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/"},"wordCount":927,"commentCount":0,"image":{"@id":"https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/#primaryimage"},"thumbnailUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2025\/11\/Micorsoft-Cyber-Security-Header-Image.png","keywords":["Microsoft Security"],"articleSection":["Microsoft Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/","url":"https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/","name":"New Cyber Security Battleground: Insights from Microsoft","isPartOf":{"@id":"https:\/\/clouddirect.net\/learning-hub\/#website"},"primaryImageOfPage":{"@id":"https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/#primaryimage"},"image":{"@id":"https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/#primaryimage"},"thumbnailUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2025\/11\/Micorsoft-Cyber-Security-Header-Image.png","datePublished":"2025-11-25T16:07:37+00:00","dateModified":"2025-11-25T16:07:38+00:00","author":{"@id":"https:\/\/clouddirect.net\/learning-hub\/#\/schema\/person\/74dbe97225c05374d42d142cdc1d2a28"},"description":"Discover how intelligence, speed, and resilience are reshaping cybersecurity in the age of AI-powered threats. Explore key findings from the Microsoft Digital Defence Report 2025. Learn how to build a resilient defence strategy and stay ahead of evolving threats.","breadcrumb":{"@id":"https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/#primaryimage","url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2025\/11\/Micorsoft-Cyber-Security-Header-Image.png","contentUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2025\/11\/Micorsoft-Cyber-Security-Header-Image.png","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/clouddirect.net\/learning-hub\/cyber-security-battleground\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clouddirect.net\/learning-hub\/"},{"@type":"ListItem","position":2,"name":"The new cyber security battleground"}]},{"@type":"WebSite","@id":"https:\/\/clouddirect.net\/learning-hub\/#website","url":"https:\/\/clouddirect.net\/learning-hub\/","name":"Learning Hub","description":"Cloud Direct","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clouddirect.net\/learning-hub\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/clouddirect.net\/learning-hub\/#\/schema\/person\/74dbe97225c05374d42d142cdc1d2a28","name":"abbieantoine","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g","caption":"abbieantoine"},"url":"https:\/\/clouddirect.net\/learning-hub\/author\/abbiefawcett\/"}]}},"_links":{"self":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/2495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/comments?post=2495"}],"version-history":[{"count":9,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/2495\/revisions"}],"predecessor-version":[{"id":2506,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/2495\/revisions\/2506"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/media\/2497"}],"wp:attachment":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/media?parent=2495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/categories?post=2495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/tags?post=2495"},{"taxonomy":"post_media_type","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/post_media_type?post=2495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}