BlueKeep: It’s Not Just About The Worm
In the last week, you have likely heard and read stories about the security vulnerability BlueKeep. It has been said to be capable of being exploited for the initiation of self-replicating worm as destructive as WannaCry.
As of June 1, over 1M computers may be at risk.
But is the danger really about The Worm?
Or is it more about millions of endpoints providing direct ingress into networks worldwide?
“The National Security Agency is urging Microsoft Windows administrators and users to ensure they are using a patched and updated system in the face of growing threats.
We have seen devastating computer worms inflict damage on unpatched systems with wide-ranging impact and are seeking to motivate increased protections against this flaw. The NSA urges everyone to invest the time and resources to know your network and run supported operating systems with the latest patches.
This is critical not just for NSA’s protection of National Security Systems but for all networks.”
-- NSA Cybersecurity Advisory - Patch Remote Desktop Services on Legacy Versions of Windows
In this Very Special Episode of InSecurity, Matt Stephenson rounded up a cast of experts to discuss BlueKeep… What is it? Where did it come from? Can it be stopped? Maybe a better question is… can it be prevented? After WannaCry and Petya/NotPetya… why is this happening again?
There’s a Bad Moon on the Rise… make sure you are ready for it.
About Kip Boyle
Kip Boyle (@KipBoyle) is a 20-year information security expert and is the founder and CEO of Cyber Risk Opportunities. He is a former Chief Information Security Officer for both technology and financial services companies and was a cyber-security consultant at Stanford Research Institute (SRI).
Boyle led the global IT risk management program for a $9 billion logistics company and was the Wide Area Network Security Director for the F-22 Raptor program. He has participated in several cybersecurity war game exercises and has worked closely with various government agencies including the FBI.
Boyle is a US Air Force officer and serves on the board of directors of the Domestic Abuse Women’s Network (DAWN). He’s been quoted in Entrepreneur magazine, Chief Executive magazine, and is the co-author of Chapter 68, Outsourcing Security Functions, in The Computer Security Handbook.
Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company's future. But, with this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager. Cybersecurity is not just a technology problem, it's a management opportunity. Learn how to manage cyber risks and ensure your company is cyber resilient now, and remain in the game no matter what the future holds.
About Richard Melick
Richard Melick (@RCMelick) is a Sr. Technical Product Marketing Manager at Automox. He has over a decade of experience in Cybersecurity and Antivirus Software, working in various career functions in the industry that have taken him all over the world.
Automox (@AutomoxApp) was founded to pursue a disruptive new vision: the complete automation of endpoint configuration, patching, management and inventory. They are the only cloud endpoint management solution capable of remediating Windows, OS X, and Linux endpoints from a single platform. Automox's Dynamic Policy Engine allows IT managers to customize and group policies that ensure that every endpoint
and software, regardless of location, meets regulatory and operational security requirements.
About Scott Scheferman
Scott Scheferman (@transhackerism) wears many hats at BlackBerry|Cylance, working between the white spaces on the org chart to ensure timely delivery of Consulting Services, effective messaging around the value of predictive AI in the context of cybersecurity operations and risk, research around how the Temporal Predictive Advantaged (TPA) ofBlackBerry|Cylance’s AI affects the broader malware economy, and public speaking at conferences and seminars around the country.
About Matt Stephenson
Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV
Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come
Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.
Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!
Make sure you Subscribe, Rate and Review!