EP02: How Tech Pros Handle Security News

Written by Hornetsecurity / 26.04.2023 /

You are currently viewing a placeholder content from Youtube. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.

More Information

You are currently viewing a placeholder content from Libsyn. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.

More Information

Welcome back for another episode of the Security Swarm Podcast, the podcast that brings you the insights and expertise straight from the Security Lab here at Hornetsecurity. In this episode, we’ll be diving into recent security disclosures with Eric Siron, Microsoft MVP, and discussing how organizations should respond when vulnerabilities are discovered. 

We’ll focus on two major incidents as examples throughout this episode; the Outlook Vulnerability CVE-2023-23397, and the re-emergence of Emotet

In today’s digital landscape, threats are constantly evolving and becoming more sophisticated, making it critical to respond quickly and efficiently minimize the impact of such incidents. Whether you’re a SysAdmin working in a small organization or the CISO of a large business, you have to be more vigilant, and have a plan. 

Tune in to learn valuable insights into how tech professionals should handle security news.  

Timestamps:

3:16 – A baseline example of a busy security news-cycle 

8:00 – Keeping an eye on the security news-cycle and has it always been this way? 

17:45 – What should organizations be doing to keep tabs on the security news-cycle? 

23:21 – What can vendors be doing better to help SysAdmins handle security news? 

Episode resources:

CVE-2023-23397

The Re-Emergence of Emotet

Hornetsecurity July 2022 Threat Review with Talk of Qakbot

White House to Shift Cybersecurity Burden

Andy on LinkedInTwitterMastodon

Eric on Twitter

Tech News Cyber Security

Critical infrastructure is at greater risk due to the interconnectivity of systems. Legacy systems are particularly vulnerable targets because they manage essential utilities such as electricity, natural gas, water, waste treatment, and transportation networks and because they were not originally designed with security in mind.

New security challenges are arising as the Internet of Things (IoT) expands. This encompassing everything from household appliances to security monitoring systems. Devices not intended to be connected to the internet are now online and potentially exposed to attacks. Without proactive testing, Microsoft networks are now more vulnerable than ever, providing hackers with new entry points for unauthorized access to home and business networks, compromising our privacy.

Secure Your Business with Microsoft 365 Total Protection

Numerous companies across the globe are starting to implement Microsoft 365 training for their employees to keep up with the latest cyber security threats. Training can aid tech pros in developing their skills and looking at the cyber security news from a different angle. Tech pros can also stay up-to-date on cyber security news and trends by participating in training and certification programs.

For this purpose, we offer the ultimate Microsoft 365 Total Protection for businesses that must protect and secure their Microsoft environment.

You might also be interested in