Visionary security partners to be honored at the very first Microsoft Security 20/20 event

Credit to Author: Todd VanderArk| Date: Thu, 06 Feb 2020 17:00:13 +0000

Microsoft Security 20/20 will put the spotlight on companies and individuals with a clear-eyed view of the security challenges we face and smart integrated solutions to help solve them.

The post Visionary security partners to be honored at the very first Microsoft Security 20/20 event appeared first on Microsoft Security.

Read more

Ghost in the shell: Investigating web shell attacks

Credit to Author: Eric Avena| Date: Tue, 04 Feb 2020 17:30:40 +0000

Web shell attacks allow adversaries to run commands and steal data from an Internet-facing server or use the server as launch pad for further attacks against the affected organization.

The post Ghost in the shell: Investigating web shell attacks appeared first on Microsoft Security.

Read more

Afternoon Cyber Tea—The State of Cybersecurity: How did we get here? What does it mean?

Credit to Author: Todd VanderArk| Date: Wed, 29 Jan 2020 17:00:00 +0000

Listen to Ann Johnson discuss the scale of cyber threats—past, present, and future—with security strategist, Marc Goodman on her new podcast, Afternoon Cyber Tea.

The post Afternoon Cyber Tea—The State of Cybersecurity: How did we get here? What does it mean? appeared first on Microsoft Security.

Read more

sLoad launches version 2.0, Starslord

Credit to Author: Eric Avena| Date: Tue, 21 Jan 2020 18:00:39 +0000

sLoad has launched version 2.0. With the new version, sLoad, which is a PowerShell-based Trojan downloader notable for its almost exclusive use of the Windows BITS service for malicious activities, has added an anti-analysis trick and the ability to track the stage of infection for every affected machine.

The post sLoad launches version 2.0, Starslord appeared first on Microsoft Security.

Read more

Changing the monolith—Part 2: Whose support do you need?

Credit to Author: Todd VanderArk| Date: Thu, 16 Jan 2020 18:00:28 +0000

Transformation can be a daunting task. In this series, I explore how change is possible when addressing the components of people, process, and technology that make up the organization.

The post Changing the monolith—Part 2: Whose support do you need? appeared first on Microsoft Security.

Read more

How to implement Multi-Factor Authentication (MFA)

Credit to Author: Elizabeth Wolk| Date: Wed, 15 Jan 2020 17:00:21 +0000

The goal of MFA implementation is to enable it for all your users, on all of your systems, all of the time. Learn how to successfully roll out and support MFA in your organization.

The post How to implement Multi-Factor Authentication (MFA) appeared first on Microsoft Security.

Read more

Rethinking cyber scenarios—learning (and training) as you defend

Credit to Author: Elizabeth Wolk| Date: Tue, 14 Jan 2020 17:00:55 +0000

Gamified cybersecurity learning is an increasingly important must-have in your SecOps program, from understanding basic concepts all the way into advanced attacker and defense scenarios. Microsoft and Circadence are working together to democratize and scale cyber readiness globally.

The post Rethinking cyber scenarios—learning (and training) as you defend appeared first on Microsoft Security.

Read more

Changing the monolith—Part 1: Building alliances for a secure culture

Credit to Author: Todd VanderArk| Date: Thu, 09 Jan 2020 17:00:23 +0000

Digital transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people, process, and technology that make up the organization.

The post Changing the monolith—Part 1: Building alliances for a secure culture appeared first on Microsoft Security.

Read more