Tag Archive for: Redmondmag.com

Team Roles and Responsibilities — Redmondmag.com


Fighting Ransomware: Team Roles and Responsibilities

From hyper-focused zero-day attacks to broad-sweeping supply chain breaches, bad actors share one common goal: stealing, damaging, and monetizing your data to their advantage.

It’s a tough problem to defend against ransomware, and it takes a well-equipped, prepared, and practiced organization to deal with complex threats successfully.

To help you better secure, defend, and recover your data, maintain healthy business operations, and manage risk, you need an approach that brings together IT, Security, and critical stakeholders.

Read this ebook to learn how to improve cross-team alignment and collaboration in the fight against ransomware.

Download now!


Source…

1 Zero-Day Security Flaw Addressed — Redmondmag.com


News

Microsoft August Patch Tuesday: 1 Zero-Day Security Flaw Addressed

In the wake of last month’s massive security update, Microsoft has released a smaller number of fixes for August.

After last months massive security update from Microsoft, this month’s patch load comes with a more-manageable 74 bulletins and two advisories.

Zero-day issues were also on the downswing this month, with Microsoft issuing a fix for just one issue that is in active exploit. As with the case, the lone zero-day, CVE-2023-38180, should be the top priority in patching this month.

The fix addresses a denial-of-service vulnerability in .NET and Visual Studio, which Microsoft said could lead to a system crash through a DDoS attack. While Microsoft has acknowledged that it has seen attacks exploiting the hole in the wild, it has not gone into any detail on the flaw or the monitored attacks.

While that directly takes care of this month’s single zero-day issue, Microsoft also released an advisory on a publicly disclosed issue in Microsoft Office, which updates an issue first disclosed last month. “This defense in depth update is not a vulnerability, but installing this update stops the attack chain leading to the Windows Search security feature bypass vulnerability (CVE-2023-36884),” wrote Microsoft. “Microsoft recommends installing the Office updates discussed in this advisory as well as installing the Windows updates from August 2023.”

While this month’s advisory can be seen as a mitigation against the Office remote code execution vulnerability, it isn’t a final patch. Microsoft has not stated when a permanent fix will be available.

Once the two zero-day items are addressed, IT should focus on applying the following “critical” bulletins:

Source…

7 Ransomware Mistakes Enterprises Make Before, During and After an Attack — Redmondmag.com


7 Ransomware Mistakes Enterprises Make Before, During and After an Attack

Date: Thursday, March 30 at 11am PT / 2pm ET

Do you want to know what everyone else is doing wrong when it comes to ransomware? At Veeam, our experts have seen it all—both big and small. Join us and we’ll share a mix of ransomware related business, organizational, procedural, and technical decision we wish enterprises just wouldn’t.

Register now!

Date: 03/30/2023

Time: 11:00am PT


Source…

Assessing and Addressing Your Organization’s Cyber Defense Weaknesses — Redmondmag.com


Hacking the Hacker: Assessing and Addressing Your Organization’s Cyber Defense Weaknesses

Date: Thursday, October 06 at 11am PT / 2pm ET

Cybercriminals are out there, watching and waiting for the perfect opportunity. They are gathering information about your organization and users, devising the perfect plan to infiltrate your defenses.

But with a strategic approach to cyber defense you can hack the hacker before they strike! In this session, we’ll share insights into their strategies and their motivations. You’ll learn how to use that understanding, along with simple strategies to make your organization a hard target.

Join Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4, for this new webinar as he exposes the mind of a hacker to help you see your cyber risks from the outside in.

In this session you’ll learn:

  • How hackers collect “private” details about your organization and your users
  • The most common root causes that lead to damaging cyber attacks
  • Common mistakes made when designing cyber defenses and how to fix them
  • Data-driven strategies for mitigating your biggest weaknesses
  • Why a strong human firewall is your best, last line of defense

Get the details you need to know now to outsmart cybercriminals before you become their next victim.

Register now!

About the presenter:

Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4

Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 13 books and over 1,000 magazine articles on computer security. He now serves as the Data-Driven Defense Evangelist for KnowBe4. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He was the weekly security columnist for InfoWorld and CSO magazines from 2005-2019.

Date: 10/06/2022

Time: 11:00am PT


Source…