This is part of a series of blogs and interviews conducted with our Microsoft Deputy CISOs, in which we surface a number of ...