Ghost in the shell: Investigating web shell attacks

Credit to Author: Eric Avena| Date: Tue, 04 Feb 2020 17:30:40 +0000

Web shell attacks allow adversaries to run commands and steal data from an Internet-facing server or use the server as launch pad for further attacks against the affected organization.

The post Ghost in the shell: Investigating web shell attacks appeared first on Microsoft Security.

Read more

RSA Conference 2020—Empower your defenders with artificial intelligence and automation

Credit to Author: Todd VanderArk| Date: Tue, 04 Feb 2020 17:00:55 +0000

The RSA Conference 2020 kicks off in less than three weeks—here are a few highlights to help you plan your time.

The post RSA Conference 2020—Empower your defenders with artificial intelligence and automation appeared first on Microsoft Security.

Read more

Guarding against supply chain attacks—Part 2: Hardware risks

Credit to Author: Todd VanderArk| Date: Mon, 03 Feb 2020 17:00:30 +0000

Part 2 examines the hardware supply chain, its vulnerabilities, how you can protect yourself, and Microsoft’s role in reducing hardware-based attacks.

The post Guarding against supply chain attacks—Part 2: Hardware risks appeared first on Microsoft Security.

Read more

Changing the Monolith—Part 3: What’s your process?

Credit to Author: Todd VanderArk| Date: Thu, 30 Jan 2020 17:00:28 +0000

Digital transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people, process, and technology that make up the organization.

The post Changing the Monolith—Part 3: What’s your process? appeared first on Microsoft Security.

Read more

Afternoon Cyber Tea—The State of Cybersecurity: How did we get here? What does it mean?

Credit to Author: Todd VanderArk| Date: Wed, 29 Jan 2020 17:00:00 +0000

Listen to Ann Johnson discuss the scale of cyber threats—past, present, and future—with security strategist, Marc Goodman on her new podcast, Afternoon Cyber Tea.

The post Afternoon Cyber Tea—The State of Cybersecurity: How did we get here? What does it mean? appeared first on Microsoft Security.

Read more

Data privacy is about more than compliance—it’s about being a good world citizen

Credit to Author: Todd VanderArk| Date: Tue, 28 Jan 2020 17:00:00 +0000

Data Privacy Day is a great time to assess your company privacy policies to ensure you comply with local and regional regulations.

The post Data privacy is about more than compliance—it’s about being a good world citizen appeared first on Microsoft Security.

Read more