Reviewing Microsoft's rough security year in 2022
For IT and security admins of Microsoft networks, 2022 has been the year of blended attacks, on-premises Exchange Server flaws, and vulnerabilities.
For IT and security admins of Microsoft networks, 2022 has been the year of blended attacks, on-premises Exchange Server flaws, and vulnerabilities.
Microsoft does not appear to be updating Windows Software Update Services, but newer patch management options might be a better choice.
The September Windows 11 update add protections against malicious applications and drivers, phishing, credential misuse, and more.
Sometimes the latest security best practices don't align with an organisation's compliance templates. These are some of the areas where you might need an exception.
It's getting harder to assess the impact of patching or not patching, and too many patches don't fully fix the problem. It's time to pressure vendors.
Microsoft is deploying new features and defaults to help keep threat actors from remotely accessing networks, but you can do more.
CISOs can follow this advice to minimise stress when recovering credentials, systems and settings after a ransomware or other cyber attack.
Are your settings, policies and processes keeping up with the changing threat landscape? Review your network to make sure.
New guidance shows how to harden PowerShell and make it more difficult for threat actors to hijack for malicious purposes.
Microsoft Defender for Business alerts can show what's happening in the network. The better users understand their network, the faster they can triage alerts.
Here's how small- to medium-sized businesses can effectively protect their networks against the risk of ransomware without breaking their security budgets.
Spring4Shell does not affect most systems, so a calm, methodical approach to assessing the real threat is best.
From cloud to on-premises access, having two-factor authentication (2FA) can help keep attackers at bay yet they continue to gain network access.
Egress filtering, conditional access rules, and free tools from governments can help identify suspicious activity and protect credentials.
Logging can be the most useful tool in a customer's security arsenal, but it’s something businesses tend to overlook and not assign resources to.
EDGE is the leading technology conference for business leaders in Australia and New Zealand, built on the foundations of collaboration, education and advancement.
ARN has celebrated gender diversity and recognised female excellence across the Australian tech channel since first launching WIICTA in 2012, acknowledging the achievements of a talented group of female front runners who have become influential figures across the local industry.
Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.