Select Page
The Threat of Ransomware: How to Protect Your System from Ransomware and other Malicious Cyber Attacks

The Threat of Ransomware: How to Protect Your System from Ransomware and other Malicious Cyber Attacks

Ransomware is a type of malware that holds computers or files for ransom by encrypting files or locking the desktop or browser on systems that are infected with it, then demanding a ransom in order to regain access. The rise ... continue reading
Advanced Threat Analytics security research network technical analysis: NotPetya

Advanced Threat Analytics security research network technical analysis: NotPetya

This post is authored by Igal Gofman, Security Researcher, Advanced Threat Analytics. On June 27, 2017 reports on a new variant of Petya (which was later referred to as NotPetya) malware infection began spreading across the globe. It seems the ... continue reading
Microsoft’s perspective on cyber resilience

Microsoft’s perspective on cyber resilience

This post is authored by Ann Johnson, Vice President, Enterprise Cybersecurity Group. In the wake of recent ransomware outbreaks, I wanted to understand how impacted firms have evolved their thinking on cyber resilience planning and implementation. I asked the Detection ... continue reading

Configuration Manager SQL queries for helping the IT Pro report on KBs related to MS17-010

NOTE: This information is now available in multiple languages in the Microsoft Knowledge Base article Configuration Manager SQL Server queries for compliance reporting related to MS17-010. The following is shared by CSS Support Escalation Engineer Vinay Pamnani, to help give ... continue reading