Infrastructure Planning and Design Guide for Malware Response
A new version of this guide went live – I think something, you should look at. There is a metrology and a process in detail: So, if you want to learn more:...
View ArticleTen Immutable Laws Of Security (Version 2.0)
You might have known the 10 Immutable Laws Of Security since quite a while. It is kind of the “collected non-technical wisdom” of what we see in security respeonse being it in Microsoft Security...
View ArticleSpecial Intelligence Report on the Rustock Takedown
As you might remember, on Match 16th Microsoft together with other industry players was successfully able to take down the Rustock botnet and thus significantly reducing the spam level. We now just...
View ArticleMicrosoft Malware Protection Center on Facebook and Twitter
I know, I have been fairly slow in blogging currently but I was fairly busy with a few cool projects (which I will disclose later) and – time flies if you are having fun Just a quick one: The MMPC on...
View ArticleVeriSign to Take Down Malware Sites?
This is actually an interesting approach: VeriSign Proposes Takedown Procedures and Malware Scanning for .Com. This leads to the discussion I have so often: What is more important? The single website...
View ArticleUsing the Microsoft Diagnostics and Recovery Toolset (DaRT) for Incident...
A few years ago I posted on DaRT after having seen it: Microsoft Diagnostics and Recovery Toolset. It is a really good an interesting tool for a lot of problems, one of them being incident response. I...
View ArticleCybersecurity–More than a good headline
A lot of governments all across the globe are working on starting, restarting or pushing their Cybersecurity initiative. What often concerns me is, that the last real headline has more impact on the...
View Article10 Years of Trustworthy Computing at Microsoft
Before joining Microsoft a little bit more than 10 years ago, I ran a team at PricewarehoureCoopers on e-Business Risk Management – classical security consulting in the Internet bubble time. When I...
View ArticleSecurity Updates and Exploit Code
CORRECTION:So far there is “only” Proof of Concept code in the wild, no real exploit. In our last update cycle we published the security bulletin MS12-020 Vulnerabilities in Remote Desktop Could Allow...
View ArticleKeep all your software updated and current
I know that I keep going and going on that. When I talk to customers and mainly to providers of the critical infrastructure about security, one of the key things to me is to keep the software updated....
View ArticleProtecting USB Sticks
It is in my opinion a controversial discussion: Do you allow the use of USB sticks in a corporate environment and if yes, how? Obviously, today there are a lot of other means to exchange information...
View ArticleDoes AI solve it all?
Artificial Intelligence and Machine Learning hold a lot of promises in security. They will help us address the problems around false positives and detecting anomalies. There is a lot of hope and a lot...
View ArticlePolitician’s Reactions on VIP Hack in Germany
I recently complained about the Swiss government and our inability in Switzerland to really drive Cybersecurity forward (Federal Council not deciding again – Switzerland falling behind on...
View ArticleUsing multi-factor authentication blocks 99.9% of account hacks
This is not fundamentally new but the figure is really high… So, why are you still using username/password? Your Pa$$word doesn’t matter
View ArticleAzure Sentinel-the cloud-native SIEM is now generally available
During RSA we announced that we will bring a cloud-native SIEM/SOAR solution to the market. Since then the team worked very hard to drive it forward. The number of private and public preview customers...
View ArticleMicrosoft Threat Intell: GALLIUM: Targeting global telecom
I guess this is important for Telcos (and others): GALLIUM: Targeting global telecom
View ArticleThreat Intelligence on COVID-19
The question what the malicious actors do during the crisis is one which comes up fairly often. My observation was – as bad as it sounds – that we had “business as usual”. As with any catastrophe or...
View Article
More Pages to Explore .....