{"id":31893,"date":"2019-06-28T02:08:30","date_gmt":"2019-06-27T17:08:30","guid":{"rendered":"https:\/\/jirak.net\/wp\/inside-the-msrc-anatomy-of-a-ssirp-incident\/"},"modified":"2019-07-10T09:34:16","modified_gmt":"2019-07-10T00:34:16","slug":"inside-the-msrc-anatomy-of-a-ssirp-incident","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/inside-the-msrc-anatomy-of-a-ssirp-incident\/","title":{"rendered":"Inside the MSRC \u2013 Anatomy of a SSIRP incident"},"content":{"rendered":"<p>Inside the MSRC \u2013 Anatomy of a SSIRP incident<\/p>\n<p>This is the second in a series of blog posts that shares how the MSRC responds to elevated threats to customers through the Software and Services Incident Response Plan (SSIRP). &#160; In our last blog post, we looked at the history of the Microsoft Security Response Center and SSIRP, and how Microsoft takes a holistic &#8230;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/msrc-blog.microsoft.com\/2019\/06\/27\/inside-the-msrc-anatomy-of-a-ssirp-incident\/\"> <span class=\"screen-reader-text\">Inside the MSRC \u2013 Anatomy of a SSIRP incident<\/span> Read More \u00bb<\/a><\/p>\n<p>Source: <a href=\"https:\/\/msrc-blog.microsoft.com\/2019\/06\/27\/inside-the-msrc-anatomy-of-a-ssirp-incident\/\" target=\"_blank\" rel=\"noopener noreferrer\">Inside the MSRC \u2013 Anatomy of a SSIRP incident<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Inside the MSRC \u2013 Anatomy of a SSIRP incident This is the second in a series of blog posts that shares how the MSRC responds to elevated threats to customers through the Software and Services Incident Response Plan (SSIRP). &#160; In our last blog post, we looked at the history of the Microsoft Security Response Center and SSIRP, and how Microsoft takes a holistic &#8230; Inside the MSRC \u2013 Anatomy of a SSIRP incident Read More \u00bb Source: Inside the MSRC \u2013 Anatomy of a SSIRP incident<\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[583],"tags":[585],"class_list":["post-31893","post","type-post","status-publish","format-standard","hentry","category-ms-msrc","tag-ms-msrc"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/31893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=31893"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/31893\/revisions"}],"predecessor-version":[{"id":31894,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/31893\/revisions\/31894"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=31893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=31893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=31893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}