Protect against BlueKeep

Credit to Author: Todd VanderArk| Date: Thu, 08 Aug 2019 16:00:57 +0000

DART offers steps you can take to protect your network from BlueKeep, the “wormable” vulnerability that can create a large-scale outbreak due to its ability to replicate and propagate.

The post Protect against BlueKeep appeared first on Microsoft Security.

Read more

Council of EU Law Enforcement Protocol improves cross-border cooperation

Credit to Author: Todd VanderArk| Date: Tue, 30 Jul 2019 16:00:00 +0000

The new EU Law Enforcement Emergency Response Protocol addresses the growing problem of planning and coordinating between governments, agencies, and companies when cyberattacks occur across international boundaries.

The post Council of EU Law Enforcement Protocol improves cross-border cooperation appeared first on Microsoft Security.

Read more

Enterprise incident response: getting ahead of the wave

Credit to Author: William Tsing| Date: Wed, 10 Jul 2019 14:19:31 +0000

As with traditional warfare, beating back attacks and winning depends on having a plan. Here are several incident respond models security researchers have developed for responding to threats.

Categories:

Tags:

(Read more…)

The post Enterprise incident response: getting ahead of the wave appeared first on Malwarebytes Labs.

Read more

Lessons learned from the Microsoft SOC Part 2b: Career paths and readiness

Credit to Author: Todd VanderArk| Date: Thu, 06 Jun 2019 16:00:16 +0000

In our second post about people—our most valuable resource in the SOC—we talk about our investments into readiness programs, career paths, and recruiting for success.

The post Lessons learned from the Microsoft SOC Part 2b: Career paths and readiness appeared first on Microsoft Security.

Read more

4 tried-and-true prevention strategies for enterprise-level security

Credit to Author: Todd VanderArk| Date: Wed, 10 Apr 2019 16:00:20 +0000

Learn about the four cyber hygiene best practices recommended in the 24th edition of the Microsoft Security Intelligence Report (SIR) to help reduce your risk of attack.

The post 4 tried-and-true prevention strategies for enterprise-level security appeared first on Microsoft Security.

Read more

Reputation management in the age of cyberattacks against businesses

Credit to Author: Jovi Umawing| Date: Thu, 14 Mar 2019 16:15:59 +0000

A business’s reputation takes years to build. With the current climate of data breaches, unsurprisingly, destroying it could only take seconds. What can businesses do to protect their brands from a fallout following a cybersecurity incident? In this post, we answer these questions and more.

Categories:

Tags:

(Read more…)

The post Reputation management in the age of cyberattacks against businesses appeared first on Malwarebytes Labs.

Read more