We collect cookies to analyze our website traffic and performance; we never collect any personal data. Cookie Policy
Accept
NEW YORK DAWN™NEW YORK DAWN™NEW YORK DAWN™
Notification Show More
Font ResizerAa
  • Home
  • Trending
  • New York
  • World
  • Politics
  • Business
    • Business
    • Economy
    • Real Estate
  • Crypto & NFTs
  • Tech
  • Lifestyle
    • Lifestyle
    • Food
    • Travel
    • Fashion
    • Art
  • Health
  • Sports
  • Entertainment
Reading: The graph database arms race: How Microsoft and rivals are revolutionizing cybersecurity
Share
Font ResizerAa
NEW YORK DAWN™NEW YORK DAWN™
Search
  • Home
  • Trending
  • New York
  • World
  • Politics
  • Business
    • Business
    • Economy
    • Real Estate
  • Crypto & NFTs
  • Tech
  • Lifestyle
    • Lifestyle
    • Food
    • Travel
    • Fashion
    • Art
  • Health
  • Sports
  • Entertainment
Follow US
NEW YORK DAWN™ > Blog > Technology > The graph database arms race: How Microsoft and rivals are revolutionizing cybersecurity
The graph database arms race: How Microsoft and rivals are revolutionizing cybersecurity
Technology

The graph database arms race: How Microsoft and rivals are revolutionizing cybersecurity

Last updated: November 20, 2024 2:29 am
Editorial Board Published November 20, 2024
Share
SHARE

Multidomain assaults are on the verge of changing into a digital epidemic as nation-states and well-funded cybercrime assault teams look to use broad gaps in digital estates’ defenses. Enterprises are having to cope with widening – and sometimes unknown – gaps between enterprise property, apps, methods, knowledge, identities and endpoints.

The fast-rising tempo of assaults is driving a graph database arms race throughout main cybersecurity suppliers. Microsoft‘s Safety Publicity Administration Platform (MSEM) at Ignite 2024 displays how rapidly the arms race is maturing and why its containment requires extra superior platforms. 

Along with Microsoft’s MSEM, different key gamers within the graph database arms race for combating multidomain threats embody CrowdStrike with its Risk Graph, Cisco’s SecureX, SentinelOne’s Purple AI, Palo Alto Networks’ Cortex XDR and Development Micro’s Imaginative and prescient One, alongside suppliers like Neo4j, TigerGraph and Amazon Neptune who provide foundational graph database expertise​.

“Three years ago, we were seeing 567 password-related attacks per second. Today, that number has skyrocketed to 7,000 per second. This represents a massive escalation in the scale, speed and sophistication of modern cyber threats, underscoring the urgency for proactive and unified security strategies,”​ Vasu Sakkal, Microsoft’s company vp of safety, compliance, id, administration and privateness, informed VentureBeat throughout a current interview.

Microsoft goes all-in on their safety imaginative and prescient at Ignite 2024

With each group experiencing extra multidomain intrusion makes an attempt and affected by undiscovered breaches, Microsoft is doubling down on safety, pivoting its technique to graph-based protection in MSEM. Sakkal informed VentureBeat, “The sophistication, scale, and speed of modern attacks require a generational shift in security. Graph databases and generative AI offer defenders the tools to unify fragmented insights into actionable intelligence.”​

Cristian Rodriguez, CrowdStrike’s Americas Discipline CTO, echoed the significance of graph expertise in a current interview with VentureBeat. “Graph databases allow us to map adversary behavior across domains, identifying the subtle connections and patterns attackers exploit. By visualizing these relationships, defenders gain the contextual insight needed to anticipate and disrupt complex, cross-domain attack strategies,” Rodriguez stated.

Key bulletins from Ignite 2024 embody:

Microsoft Safety Publicity Administration Platform (MSEM). On the core of Microsoft’s technique, MSEM leverages graph expertise to dynamically map relationships throughout digital estates, together with units, identities and knowledge. MSEM assist for graph databases permits safety groups to determine high-risk assault paths and prioritize proactive remediation efforts.

Zero Day Quest. Microsoft is providing $4M in rewards to uncover vulnerabilities in AI and cloud platforms. This initiative goals to convey collectively researchers, engineers and AI pink groups to handle important dangers preemptively.

Home windows Resiliency Initiative. Specializing in zero belief rules, this initiative seems to reinforce system reliability and restoration by securing credentials, implementing Zero Belief DNS protocols and fortifying Home windows 11 towards rising threats.

Safety Copilot Enhancements. Microsoft claims that Safety Copilot’s generative AI capabilities improve SOC operations by automating risk detection, streamlining incident triage and lowering imply time to decision by 30%. Built-in with Entra, Intune, Purview and Defender, these updates present actionable insights, serving to safety groups deal with threats with higher effectivity and accuracy.

Updates in Microsoft Purview. Purview’s superior Knowledge Safety Posture Administration (DSPM) instruments sort out generative AI dangers by discovering, defending and governing delicate knowledge in real-time. Options embody detecting immediate injections, mitigating knowledge misuse and stopping oversharing in AI apps. The device additionally strengthens compliance with AI governance requirements, aligning enterprise safety with evolving rules.

Why now? The position of graph databases in cybersecurity

John Lambert, company vp for Microsoft Safety Analysis, underscored the important significance of graph-based considering in cybersecurity, explaining to VentureBeat, “Defenders think in lists, cyberattackers think in graphs. As long as this is true, attackers win.”

He added that Microsoft’s strategy to publicity administration includes making a complete graph of the digital property, overlaying vulnerabilities, risk intelligence and assault paths. “It’s about giving defenders a complete map of their environment, allowing them to prioritize the most critical risks while understanding the potential blast radius of any compromise,” Lambert added.

Graph databases are gathering momentum as an architectural technique for cybersecurity platforms. They excel at visualizing and analyzing interconnected knowledge, which is important for figuring out assault paths in actual time.

Key advantages of graph databases embody:

Relational Context: Map relationships between property and vulnerabilities.

Quick Querying: Traverse billions of nodes in milliseconds.

Risk Detection: Determine high-risk assault paths, lowering false positives.

Data Discovery: Use graph AI for insights into interconnected dangers.

Behavioral Evaluation: Graphs detect refined assault patterns throughout domains.

Scalability: Combine new knowledge factors seamlessly into current risk fashions.

Multidimensional Evaluation:

The Gartner warmth map underscores how graph databases excel in cybersecurity use instances like anomaly detection, monitoring and decision-making, positioning them as important instruments in trendy protection methods.

“Emerging Tech: Optimize Threat Detection With Knowledge Graph Databases,” Might 2024. Supply: Gartner

What makes Microsoft’s MSEM platform distinctive

The Microsoft Safety Publicity Administration Platform (MSEM) differentiates itself from different graph database-driven cybersecurity platforms by its real-time visibility and danger administration, which helps safety operations heart groups keep on high of dangers, threats, incidents and breaches.

Sakkal informed VentureBeat, “MSEM bridges the gap between detection and action, empowering defenders to anticipate and mitigate threats effectively.” The platform exemplifies Microsoft’s imaginative and prescient of a unified, graph-driven safety strategy, providing organizations the instruments to remain forward of recent threats with precision and velocity.

Constructed on graph-powered insights, MSEM integrates three core capabilities wanted to battle again towards multi-domain assaults and fragmented safety knowledge. They embody:

Assault Floor Administration. MSEM is designed to supply a dynamic view of a company’s digital property, enabling the identification of property, interdependencies and vulnerabilities. Options like automated discovery of IoT/OT units and unprotected endpoints guarantee visibility whereas prioritizing high-risk areas. The machine stock dashboard categorizes property by criticality, serving to safety groups give attention to essentially the most pressing threats with precision.

2024 11 18 9 44 36

Supply: Microsoft

Assault Path Evaluation. MSEM makes use of graph databases to map assault paths from an adversary’s perspective, pinpointing important routes they may exploit. Enhanced with AI-driven graph modeling, it identifies high-risk pathways throughout hybrid environments, together with on-premises, cloud and IoT methods.

Unified Publicity Insights. Microsoft additionally designed MSEM to translate technical knowledge into actionable intelligence for each safety professionals and enterprise chief personas. It helps ransomware safety, SaaS safety, and IoT danger administration, guaranteeing focused, insightful knowledge is offered to safety analysts.

Microsoft additionally introduced the next MSEM enhancements at Ignite 2024: 

Third-Social gathering Integrations: MSEM connects with Rapid7, Tenable and Qualys, broadening its visibility and making it a robust device for hybrid environments.

AI-Powered Graph Modeling: Detects hidden vulnerabilities and performs superior risk path evaluation for proactive danger discount.

Historic Tendencies and Metrics: This device tracks shifts in publicity over time, serving to groups adapt to evolving threats confidently.

Graph databases’ rising position in cybersecurity

Graph databases have confirmed invaluable in monitoring and defeating multi-domain assaults. They excel at visualizing and analyzing interconnected knowledge in actual time, enabling sooner and extra correct risk detection, assault path evaluation and danger prioritization. It’s no shock that graph database expertise dominates the roadmaps of main cybersecurity platform suppliers.

Cisco’s SecureX Risk Response is one instance. The Cisco platform extends the utility of graph databases into network-centric environments, connecting knowledge throughout endpoints, IoT units and hybrid networks. Key strengths embody an built-in incident response that’s built-in throughout the Cisco suite of apps and instruments and network-centric visibility.”What we have now to do is guarantee that we use AI natively for defenses since you can not exit and battle these AI weaponization assaults from adversaries at a human scale. You must do it at machine scale,” Jeetu Patel, Cisco’s government vp and CPO, informed VentureBeat in an interview earlier this yr.

CrowdStrike’s Risk Graph was launched at their annual buyer occasion, Fal.Con in 2022 and is commonly cited for instance of the ability of graph databases in endpoint safety. Processing over 2.5 trillion day by day occasions, Risk Graph excels in detecting weak alerts and mapping adversary habits. Rodriguez emphasised to VentureBeat, “Our graph capabilities ensure precision by focusing on endpoint telemetry, providing defenders with actionable insights faster than ever.” CrowdStrike’s key differentiators embody endpoint precision in monitoring lateral actions and figuring out anomalous behaviors. Risk Graph additionally helps behavioral evaluation used on AI to uncover adversary strategies throughout workloads.

Palo Alto Networks (Cortex XDR), SentinelOne (Singularity) and Development Micro are among the many notable gamers leveraging graph databases to reinforce their risk detection and real-time anomaly evaluation capabilities. Gartner predicted within the current analysis observe Rising Tech: Optimize Risk Detection With Data Graph Databases that their widespread adoption will proceed resulting from their capability to assist AI-driven insights and scale back noise in safety operations.​

Graph databases will remodel enterprise protection

Microsoft’s Lambert encapsulated the trade’s trajectory by stating, “May the best attack graph win. Graph databases are transforming how defenders think about interconnected risks,” underscoring their pivotal position in trendy cybersecurity methods.

Multi-domain assaults goal the weaknesses between and inside advanced digital estates. Discovering gaps in id administration is an space nation-state attackers think about and mine knowledge to entry the core enterprise methods of an organization. Microsoft joins Cisco, CrowdStrike, Palo Alto Networks, SentinelOne and Development Micro, enabling and persevering with to enhance graph database expertise to determine and act on threats earlier than a breach occurs.

VB Day by day

By subscribing, you comply with VentureBeat’s Phrases of Service.

An error occured.

You Might Also Like

AI denial is turning into an enterprise threat: Why dismissing “slop” obscures actual functionality positive factors

GAM takes purpose at “context rot”: A dual-agent reminiscence structure that outperforms long-context LLMs

The 'reality serum' for AI: OpenAI’s new technique for coaching fashions to admit their errors

Anthropic vs. OpenAI pink teaming strategies reveal completely different safety priorities for enterprise AI

Inside NetSuite’s subsequent act: Evan Goldberg on the way forward for AI-powered enterprise methods

TAGGED:armscybersecuritydatabasegraphMicrosoftracerevolutionizingrivals
Share This Article
Facebook Twitter Email Print

Follow US

Find US on Social Medias
FacebookLike
TwitterFollow
YoutubeSubscribe
TelegramFollow
Popular News
HHS, FDA start ‘Operation Stork Velocity’ to enhance high quality of toddler components
Health

HHS, FDA start ‘Operation Stork Velocity’ to enhance high quality of toddler components

Editorial Board May 16, 2025
Non-Monogamy Advocates Ask Facebook to Be More Open
Same-Sex Marriage Bill, Considered Dead on Arrival, Gains New Life
Much less ache, extra achieve: Phenol-groups drive a brand new recipe for safer, stronger mRNA vaccines
Giants declare former Jets returner Xavier Gipson off waivers

You Might Also Like

Nvidia's new AI framework trains an 8B mannequin to handle instruments like a professional
Technology

Nvidia's new AI framework trains an 8B mannequin to handle instruments like a professional

December 4, 2025
Gong examine: Gross sales groups utilizing AI generate 77% extra income per rep
Technology

Gong examine: Gross sales groups utilizing AI generate 77% extra income per rep

December 4, 2025
AWS launches Kiro powers with Stripe, Figma, and Datadog integrations for AI-assisted coding
Technology

AWS launches Kiro powers with Stripe, Figma, and Datadog integrations for AI-assisted coding

December 4, 2025
Workspace Studio goals to unravel the true agent drawback: Getting staff to make use of them
Technology

Workspace Studio goals to unravel the true agent drawback: Getting staff to make use of them

December 4, 2025

Categories

  • Health
  • Sports
  • Politics
  • Entertainment
  • Technology
  • Art
  • World

About US

New York Dawn is a proud and integral publication of the Enspirers News Group, embodying the values of journalistic integrity and excellence.
Company
  • About Us
  • Newsroom Policies & Standards
  • Diversity & Inclusion
  • Careers
  • Media & Community Relations
  • Accessibility Statement
Contact Us
  • Contact Us
  • Contact Customer Care
  • Advertise
  • Licensing & Syndication
  • Request a Correction
  • Contact the Newsroom
  • Send a News Tip
  • Report a Vulnerability
Term of Use
  • Digital Products Terms of Sale
  • Terms of Service
  • Privacy Policy
  • Cookie Settings
  • Submissions & Discussion Policy
  • RSS Terms of Service
  • Ad Choices
© 2024 New York Dawn. All Rights Reserved.
Welcome Back!

Sign in to your account

Lost your password?