Afternoon Cyber Tea: Peak, Plateau, or Plummet? Cyber security trends that are here to stay and how to detect and recover from ransomware attacks

The rapidity of change in the cyberthreat landscape can be daunting for today’s cyber defense teams. Just as they perfect the ability to block one attack method, adversaries change their approach.
The post Afternoon Cyber Tea: Peak, Plateau, or Plummet? Cyber security trends that are here to stay and how to detect and recover from ransomware attacks appeared first on Microsoft Security. READ MORE HERE…

Read more

Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them

Every year billions of new connected devices come online. These devices enable businesses to finetune operations, optimize processes, and develop analytics-based services.
The post Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them appeared first on Microsoft Security. READ MORE HERE…

Read more

Cybersecurity best practices to implement highly secured devices

If an internet-connected device performs a non-critical function, why does it need to be highly secured? Because any device can be the target of a hacker, and any hacked device can be weaponized.
The post Cybersecurity best practices to implement highly secured devices appeared first on Microsoft Security. READ MORE HERE…

Read more

Managing risk in today’s IoT landscape: not a one-and-done

Connectivity empowers organizations to unlock the full potential of IoT—but it also introduces new cybersecurity attack vectors. What does it take to manage those risks?
The post Managing risk in today’s IoT landscape: not a one-and-done appeared first on Microsoft Security. READ MORE HERE…

Read more

Defending the power grid against supply chain attacks—Part 2: Securing hardware and software

The hardware and software companies who supply utilities must implement better security of their build and update environment to reduce the risk of an attack on critical infrastructure.
The post Defending the power grid against supply chain attacks—Part 2: Securing hardware and software appeared first on Microsoft Security. READ MORE HERE…

Read more

Defending the power grid against supply chain attacks—Part 1: The risk defined

The “Defending the power grid against supply chain attacks” blog series analyzes how supply chain attacks are conducted and the steps utilities, device manufacturers, and software providers can take to better secure critical infrastructure.
The post Defending the power grid against supply chain attacks—Part 1: The risk defined appeared first on Microsoft Security. READ MORE HERE…

Read more