
Zero Trust and its role in securing the new normal
As the global crisis around COVID-19 continues, security teams have been forced to adapt to a rapidly evolving security landscape. Schools, businesses, and healthcare organizations are all getting work done from home on a variety of devices and locations, extending ... continue reading
Business Continuity with Azure – Backup
As someone who has worked in IT departments and an IT consultant for a Managed Service Provider (MSP), Business Continuity plans are something I’ve been involved in quite a lot. Either recovering from a threat or designing a solution that ... continue reading

Mitigating vulnerabilities in endpoint network stacks
The skyrocketing demand for tools that enable real-time collaboration, remote desktops for accessing company information, and other services that enable remote work underlines the tremendous importance of building and shipping secure products and services. While this is magnified as organizations ... continue reading

Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk
At a time when remote work is becoming universal and the strain on SecOps, especially in healthcare and critical industries, has never been higher, ransomware actors are unrelenting, continuing their normal operations. Multiple ransomware groups that have been accumulating access ... continue reading

Security guidance for remote desktop adoption
As the volume of remote workers quickly increased over the past two to three months, the IT teams in many companies scrambled to figure out how their infrastructures and technologies would be able to handle the increase in remote connections ... continue reading

Microsoft shares new threat intelligence, security guidance during global crisis
Ready or not, much of the world was thrust into working from home, which means more people and devices are now accessing sensitive corporate data across home networks. Defenders are working round the clock to secure endpoints and ensure the ... continue reading

Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks
Gaining kernel privileges by taking advantage of legitimate but vulnerable kernel drivers has become an established tool of choice for advanced adversaries. Multiple malware attacks, including RobbinHood, Uroburos, Derusbi, GrayFish, and Sauron, and campaigns by the threat actor STRONTIUM, have ... continue reading

Behavioral blocking and containment: Transforming optics into protection
In today’s threat landscape—overrun by fileless malware that live off the land, highly polymorphic threats that mutate faster than traditional solutions can keep up with, human-operated attacks that adapt to what adversaries find on compromised machines, and other sophisticated threats—behavioral ... continue reading
Premier Offerings: Onboarding Accelerator – Office 365 Security and Compliance
Houston… We have a Problem… Have you ever noticed there is an awful lot of educational workshops and deliveries that teach you about all these amazing features, but ultimately leave you wondering how to actually implement them in your environment? ... continue reading

Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks
Computers with Windows Remote Desktop Protocol (RDP) exposed to the internet are an attractive target for adversaries because they present a simple and effective way to gain access to a network. Brute forcing RDP, a secure network communications protocol that ... continue reading