This week, Adam and Andy give you their thoughts on the Fireeye and Solarwinds breach. They also give defenders advice on immediate steps to help strengthen their organizations as well as some future insights on the direction security may be heading in terms on identity and device management. Finally, they give some thoughts on why it is important for security, business, and technical teams need to work as one cohesive unit in order to make security programs successful.
\nDocumentation:
\nUnauthorized Access of FireEye Red Team Tools
\nCheck Point Response to FireEye Red Team Tools Leak
\n\n\n\nBecoming resilient by understanding cybersecurity risks: Part 2
\nDetecting Abuse of Authentication Mechanisms by the NSA
\nProtecting Microsoft 365 from on-premises attacks
\nAndy Jaw
\nTwitter: @ajawzero
\nLinkedIn: https://www.linkedin.com/in/andyjaw/
\nAdam Brewer
\nTwitter: @ajbrewer
\nLinkedIn: https://www.linkedin.com/in/adamjbrewer/
\n\n--- \n\nSend in a voice message: https://podcasters.spotify.com/pod/show/blue-security-podcast/message