CISA has issued an emergency directive in response to Midnight Blizzard, or Cozy Bear, a Russian threat actor targeting Microsoft email accounts. The group is extracting information to access Microsoft customer systems. Strict security measures, including strong passwords and multi-factor authentication, are strongly recommended by CISA for all organizations (Microsoft included).

You are viewing a single thread.
View all comments View context
11 points

For your last two questions, the counterpoint is, if even Microsoft can’t stop a dedicated nation state, how can any other major service provider say they haven’t been compromised?

The standard now is, assume breach. While unfortunate, the industry average for MTTD is in months. Microsoft was at least good enough to detect it within six.

Can Broadcom or Palo Alto say the same? Amazon, Google, Apple, Cisco?

permalink
report
parent
reply
5 points

It’s why I think it’s a shame the zero-trust is kinda a buzzword. this is exactly the type of situation where an actual zero trust architecture would be extremely useful.

permalink
report
parent
reply
2 points

I think that zero trust is not enough.

I think that you need to assume that you are going to be compromised and put processes and procedures in place before that happens to ensure business continuity.

permalink
report
parent
reply
6 points

im approaching zero trust as assume everything is compromised until you verify it is not

permalink
report
parent
reply
1 point

Maybe cyber resilience? Quick identify, respond and recover from an incident.

permalink
report
parent
reply

Cybersecurity

!cybersecurity@sh.itjust.works

Create post

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

  • Be respectful. Everyone should feel welcome here.
  • No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
  • No Ads / Spamming.
  • No pornography.

Community Rules

  • Idk, keep it semi-professional?
  • Nothing illegal. We’re all ethical here.
  • Rules will be added/redefined as necessary.

If you ask someone to hack your “friends” socials you’re just going to get banned so don’t do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

Community stats

  • 1.6K

    Monthly active users

  • 1.3K

    Posts

  • 2.6K

    Comments