Solarwinds Revisited and Tech Policy under a Biden Administration

Published: Jan. 11, 2021, 5 a.m.

This week, Adam and Andy revisit some more guidance that has come out about Sunburst/Solarigate since the initial breach. Additionally, they share some thoughts about this week's insurrection at the US Capitol and the cybersecurity implications. Finally, with a Biden administration and a Democratic controlled government, Andy and Adam speculate on what might be taken up as priority when it comes to tech policy.

\n

Documentation:

\n

Microsoft Solarigate Resource Center

\n

Using Splunk to Detect Sunburst Backdoor

\n

Analyzing Solorigate, the compromised DLL file  that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers

\n

Using Microsoft 365 Defender to protect against Solorigate

\n

M365 advanced hunting queries

\n

Understanding "Solorigate"'s Identity IOCs - for Identity Vendors and their customers

\n

Protecting Microsoft 365 from on-premises attacks

\n

Contact:

\n

Twitter: @bluesecuritypod

\n

Instagram: @bluesecuritypodcast

\n

Andy Jaw

\n

Twitter: @ajawzero

\n

LinkedIn: andyjaw

\n

Email: andy@bluesecuritypod.com

\n

Adam Brewer

\n

Twitter: @ajbrewer

\n

LinkedIn: adambrewer

\n

Email: adam@bluesecuritypod.com

\n\n--- \n\nSend in a voice message: https://podcasters.spotify.com/pod/show/blue-security-podcast/message