Episode
Proactively Secure your IT Environment from Credential Theft with POP-SLAM
As the tools and techniques for credential theft and reuse attacks like the Pass-the-Hash (PtH) attack improve, malicious users are finding it easier to achieve their goals through these attacks. Tune in as Lex Thomas and Jessica Payne give us an overview of the Proactive Operations Program and how it can help secure against lateral traversal account movement (POP-SLAM) – a key aspect of a PtH attack and other forms of credential theft.
Learn more about Microsoft Premier Support Services.
Send your comments or questions to the "Taste of Premier" Podcast show!
Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS
__________________________
Build Your Lab!
Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now!
Don't Have a Lab?
Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download
__________________________
Websites & Blogs:
Videos:
- How to Mitigate Pass-the-Hash and Other Forms of Credential Theft
- Securing your Desktop: How a Threat Becomes a Security Patch
- Microsoft Security Risk Assessment - How to Optimize Your IT Security Program
- Microsoft Threat Detection Service Overview
- Cybersecurity Incident Response
- Securing Your Active Directory Environment
- Protect Your Enterprise with the Enhanced Mitigation Experience Toolkit
As the tools and techniques for credential theft and reuse attacks like the Pass-the-Hash (PtH) attack improve, malicious users are finding it easier to achieve their goals through these attacks. Tune in as Lex Thomas and Jessica Payne give us an overview of the Proactive Operations Program and how it can help secure against lateral traversal account movement (POP-SLAM) – a key aspect of a PtH attack and other forms of credential theft.
Learn more about Microsoft Premier Support Services.
Send your comments or questions to the "Taste of Premier" Podcast show!
Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS
__________________________
Build Your Lab!
Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now!
Don't Have a Lab?
Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download
__________________________
Websites & Blogs:
Videos:
- How to Mitigate Pass-the-Hash and Other Forms of Credential Theft
- Securing your Desktop: How a Threat Becomes a Security Patch
- Microsoft Security Risk Assessment - How to Optimize Your IT Security Program
- Microsoft Threat Detection Service Overview
- Cybersecurity Incident Response
- Securing Your Active Directory Environment
- Protect Your Enterprise with the Enhanced Mitigation Experience Toolkit
Have feedback? Submit an issue here.