How to check your vulnerability to credential dumping
Use these techniques to see if attackers have harvested authentication credentials from your Windows network.
Use these techniques to see if attackers have harvested authentication credentials from your Windows network.
Credit to Author: Eric Avena| Date: Tue, 04 Feb 2020 17:30:40 +0000
Web shell attacks allow adversaries to run commands and steal data from an Internet-facing server or use the server as launch pad for further attacks against the affected organization.
The post Ghost in the shell: Investigating web shell attacks appeared first on Microsoft Security.
Read moreCredit to Author: Todd VanderArk| Date: Tue, 04 Feb 2020 17:00:55 +0000
The RSA Conference 2020 kicks off in less than three weeks—here are a few highlights to help you plan your time.
The post RSA Conference 2020—Empower your defenders with artificial intelligence and automation appeared first on Microsoft Security.
Read moreCredit to Author: Todd VanderArk| Date: Mon, 03 Feb 2020 17:00:30 +0000
Part 2 examines the hardware supply chain, its vulnerabilities, how you can protect yourself, and Microsoft’s role in reducing hardware-based attacks.
The post Guarding against supply chain attacks—Part 2: Hardware risks appeared first on Microsoft Security.
Read moreCredit to Author: Todd VanderArk| Date: Mon, 03 Feb 2020 14:05:00 +0000
New capabilities help you manage eDiscovery in Microsoft Teams and Yammer.
The post New capabilities for eDiscovery now available appeared first on Microsoft Security.
Read moreCredit to Author: Todd VanderArk| Date: Thu, 30 Jan 2020 17:00:28 +0000
Digital transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people, process, and technology that make up the organization.
The post Changing the Monolith—Part 3: What’s your process? appeared first on Microsoft Security.
Read moreCredit to Author: Todd VanderArk| Date: Wed, 29 Jan 2020 17:00:52 +0000
A cyber-risk assessment is crucial to any organization’s risk management strategy.
The post Cyber-risk assessments—the solution for companies in the Fourth Industrial Revolution appeared first on Microsoft Security.
Read moreCredit to Author: Todd VanderArk| Date: Wed, 29 Jan 2020 17:00:00 +0000
Listen to Ann Johnson discuss the scale of cyber threats—past, present, and future—with security strategist, Marc Goodman on her new podcast, Afternoon Cyber Tea.
The post Afternoon Cyber Tea—The State of Cybersecurity: How did we get here? What does it mean? appeared first on Microsoft Security.
Read moreCredit to Author: Todd VanderArk| Date: Tue, 28 Jan 2020 17:05:04 +0000
Joy Chik, Corporate Vice President of Identity, shares five priorities central to security that organizations should prioritize in 2020.
The post 5 identity priorities for 2020 appeared first on Microsoft Security.
Read moreCredit to Author: Todd VanderArk| Date: Tue, 28 Jan 2020 17:00:00 +0000
Data Privacy Day is a great time to assess your company privacy policies to ensure you comply with local and regional regulations.
The post Data privacy is about more than compliance—it’s about being a good world citizen appeared first on Microsoft Security.
Read more