Posts

Showing posts from March, 2022

Azure Defender for IoT helps Global Geological Materials Company Secure Production and Bridge the IT/OT Gap

Keeping pace with digital transformation isn't easy, particularly when your company is mainly focused on pulling rocks from the ground. This customer success story highlights how an IoT security solution became a top priority for global lime and minerals producer Lhoist to keep digital transformation from stalling. Microsoft Azure Defender for IoT has enabled Lhoist's critical OT equipment to be more connected to the plant's IT network, which is in turn connected to the larger organization's corporate IT network. With 80 plants in more than 25 countries, this unifying of IT security with industrial automation was a critical factor in the company's continued digital transformation evolution. Read the story to learn from Lhoist's experience. Read More...

Taking Threat Detection and Response to the Next Level with Open XDR

The way security teams approach threat detection and response is at a turning point. To guard against complex threats and safely navigate digital transformation, organizations like yours need broad visibility, connected data and the ability to make smart decisions, fast. XDR automates repetitive work and brings all the anchor tenants that are required to detect and respond to threats into a simple, seamless user experience for analysts and administrators. Read this blog to learn how to take your business's threat detection response to the next level with open XDR. Contact us to discuss flexible pricing plans. Read More...

NRGi: Stepping Up Security with Centralized, Real-Time Threat Monitoring

With cyberattacks becoming ever-more sophisticated and aggressive, how can Danish utilities company NRGi improve its ability to protect its business systems against hackers and malware? Read this case study to learn how NRGi worked with IBM Gold Business Partner SecureDevice to deploy a central monitoring system that detects advanced threats automatically — enabling more proactive network security responses. Contact a Cyber Security Consulting Ops IBM security consultant to discuss achieving similar results for your organization. Read More...

What is Extended Detection and Response?

Extended detection and response (XDR) is a security solution that delivers end-to-end visibility, detection, investigation and response across multiple security layers for businesses like yours. Read this blog to better understand the solution's benefits, including significantly faster incident response times. Read More...

New Research Shows IoT and OT Innovation is Critical to Business but Comes with Significant Risk

This blog explores the security risks inherent with IoT/OT and concludes adoption is critical even with the security challenges. In addition, it provides a link to a collaborative report from Microsoft and the Ponemon Institute highligting data on the state of IoT and OT security from a customer's perspective. Read the blog for a review of the research and quantified findings. Read More...

Best Practices for AI Security Risk Management

This blog examines Microsoft's latest efforts to tackle what it sees as a growing gap between the security and popularity of AI systems. Microsoft's ML team recently published a framework that explains how organizations can gather information on their use of AI, analyze the current state of their security, and create ways of tracking progress. The blog also provides a link to that report. Read More...

Unit 42 Cyber Risk Management

Palo Alto Networks Unit 42 has always taken a "threat-informed" approach when it comes to the biggest cyber risks to your organization—including the rapidly expanding Russian cyberwarfare threat. Watch the video to see this approach in action and to discover how Unit 42's Cyber Risk Management helps CISOs prioritize resources and respond to threats before they materialize. Read More...

Western businesses & governments are on high alert in response to the dire threat posed by Russia's escalating #cyberwarfare against western interests. DM us for concrete steps you can take right now to mitigate risk.

Western businesses & governments are on high alert in response to the dire threat posed by Russia's escalating #cyberwarfare against western interests. DM us for concrete steps you can take right now to mitigate risk.

Don't let AI security risks outweigh the benefits it brings to your organization. @msftsecurity is moving faster than the adversaries. #BeFearless #MicrosoftSecurity

Don't let AI security risks outweigh the benefits it brings to your organization. @msftsecurity is moving faster than the adversaries. #BeFearless #MicrosoftSecurity

Five Ways to Help Defend Against the Next Big Cyberattack

The SolarWinds hack revealed gaping vulnerabilities and threats to national security - but businesses be warned: it's certainly not the end of advanced cyberattacks. In less than a year, organizations worldwide have found themselves victims of multiple high-profile attacks, including Microsoft Exchange Server exploits, Kaseya VSA ransomware attacks, and countless other ransomware attacks. Cyber Security Consulting Ops invites you to read this whitepaper for recommendations and guidance to help reduce vulnerabilities and threat exposure across your business while protecting adjacent supply chains. View: Five Ways to Help Defend Against the Next Big Cyberattack

Mobile Threat Defense Best Practices

With threats to mobile devices on the rise, organizations need to turn their attention to mobile security. This video examines best practices to implement to help secure your organizations from threats to mobile devices.

What are the risks of employees using personal smartphones for work? Retweet to get the conversation going. How can Cyber Security Consulting Ops can help you with your mobile threat defense strategy? @msftsecurity #ThreatProtection

What are the risks of employees using personal smartphones for work? Retweet to get the conversation going. How can Cyber Security Consulting Ops can help you with your mobile threat defense strategy? @msftsecurity #ThreatProtection

 Now Tech: Zero Trust Solution Providers, Q2 2020

Before you can get started with Zero Trust, you'll first have to select from a diverse set of vendors that vary by size, functionality, geography and vertical market focus. Read this Forrester report for security and risk pros to help you select a provider. View:  Now Tech: Zero Trust Solution Providers, Q2 2020

Next-Generation Firewall Demo

 This video demonstrates how Palo Alto Networks Next-Generation Firewalls (NGFW) secures your business with a prevention-focused architecture. See how PAN-OS and integrated innovations like Threat Prevention, WildFire Malware Analysis, URL Filtering and DNS Security protect you against modern security threats like credential theft and data exfiltration. To learn how Palo Alto NGFWs simplify security and minimize risk, contact Cyber Security Consulting Ops. Read More...

Hackers may have obtained 190GB of sensitive data from Samsung

Some of Samsung's confidential data has reportedly leaked due to a suspected cyberattack. On Friday, South American hacking group Lapsus$ uploaded a trove of data it claims came from the smartphone manufacturer. Bleeping Computer was among the first publications to report on the incident. Among other information, the collective says it obtained the bootloader source code for all of Samsung's recent devices, in addition to code related to highly... Read More...

USB Forensics — Recover More Volume Serial Numbers with the Windows 10 Partition/Diagnostic Event Log

Windows 10 introduced an event log of high value to digital forensic examiners and incident responders — especially when device attribution is required. Written for a technical audience, this blog shares the results of an analysis showing what can be stored in the log. Read the blog to gain insight into methodology, results and their relevance. Read More...

Your Guide to Mobile Digital Forensics

The security community is constantly learning from each other to better protect the world against cyber threats. In this blog, Microsoft Security Product Marketing Manager Natalia Godyla talks with Cellebrite Senior Director of Digital Intelligence, Heather Mahalik. Read the blog for expert insight on digital forensics with a focus on mobile forensics — from technical guidance to hiring best practices. Read More...