You are invited! Microsoft Entra Identity Governance – Streamline Identity Lifecycle & Entitlements

 

Microsoft Entra Identity Governance –
Streamline Identity Lifecycle & Entitlements

 Please join us for this event,
Microsoft and Invoke would like to partner on a customer-facing webinar on
the topic of Identity Governance.

 Description:

Join Invoke and the
Microsoft Entra product group for an overview of Identity Governance and how
this Microsoft Cloud solution can help solve business challenges by
streamlining processes, reducing costs, and improving compliance. In this
session, we will align real-world use cases to specific Identity Governance
features including Lifecycle workflows, Entitlement management, Access
reviews, and Privileged identity management. Whether you’re a decision maker
or a technical influencer, this webinar is a must-attend event for anyone
looking to improve their organization’s security and compliance posture.

  March 8, 2023 9:00 -10:00 PST

      REGISTER HERE   

 

The 2022 Microsoft Digital Defense Report

Increase your cyber resiliency by acting on new threat intelligence insights from a diverse team of Microsoft security researchers.

As a company with billions of customers around the world, Microsoft has a unique vantage point to understand the scope and scale of digital threats around the globe.

The 2022 Microsoft Digital Defense Report is the culmination of threat intelligence data and insights gathered by a diverse group of Microsoft security professionals over the past year. Download the latest report to:

Learn about the state of cybercrime and the evolving threat landscape.

Explore the latest intel on hacking trends and attack methods that are growing in popularity.

Get data-backed advice on how to improve cyber resiliency and bolster your organization’s security posture.

Download
the 2022 Microsoft Digital Defense Report

Stay compliant with evolving California Consumer Privacy Act (CCPA) regulations

 

We
know protecting your customer and employee data is one of your highest
priorities. Leveraging comprehensive security and privacy compliance
solutions is the best way for organizations to increase data security,
maintain consumer trust, and prevent any costly fines.

Join
the compliance experts at Microsoft and Lighthouse for an upcoming webinar
to learn how to keep up with both the recent updates to the California
Consumer Privacy Act (CCPA) and other pending regulatory changes. You’ll
learn how to quickly assess your current compliance status, prioritize
solving any gaps, and mitigate future risks. Additionally, the experts will
cover:

  • Recommendations to ensure your organization adheres
    to CCPA regulations
  • Insights from organizations who are successfully using
    compliance tools
  • Best practices to ensure your organization stays
    ahead of evolving compliance laws

Webinar date:
Thursday, February 16, 2023
11:00 AM Pacific Time / 2:00 PM Eastern Time

 

Stay ahead of the rapidly changing landscape of the
California Consumer Privacy Act (CCPA)


 

New Three-Part Webinar Series and Share your Input on Draft NIST SP 800-63-4, Digital Identity Guidelines

 NIST is hosting a new webinar series to gain critical input on Draft NIST
Special Publication 800-63 Revision 4, Digital
Identity Guidelines
. During these three separate virtual
events, NIST moderators will explore different aspects of the guidance with
expert panelists and seek additional input from the public via a moderated
Slack discussion and extended Q&A.

Webinar #1: Digital Identity Risk Management and Assurance Level
Selection

Details:  

This webinar will feature a discussion about digital identity
risks. Panelists will explore the various lenses through which digital identity
can be viewed, the variety and breadth of associated risks, and how those risks
might be considered in organizational, societal, and individual contexts.

Register

Webinar #2: Innovating Identity Proofing

Details:  

This webinar will focus on the changes NIST has made to identity
proofing guidance and illicit inputs on how the government and industry can
continue to innovate on identity proofing technology and services. Panelists
will discuss leading practices in commercial and public sector use cases,
emerging trends, areas of continued improvement, and techniques that may
provide additional optionality and choice for end users.

Register

Webinar #3: The Future of Authentication

Details:  

This webinar will focus on the evolving nature of authentication
technology and how organizations and NIST are addressing new innovations in the
space. Panelists will explore phishing resistant authentication, trends in
multifactor authentication, and the challenges with moving on from SMS
authentication.

Register

Learn
More

High-Performance Computing (HPC) Security: Draft NIST SP 800-223

 NIST is requesting public comments on the initial public draft of
Special Publication (SP) 800-223,
High-Performance
Computing (HPC) Security: Architecture, Threat Analysis, and Security Posture
.

Executive Order 13702 established the National Strategic Computing
Initiative (NSCI) to maximize the benefits of high-performance computing (HPC)
for economic competitiveness and scientific discovery. Securing HPC systems is
challenging due to their size; performance requirements; diverse and complex
hardware, software, and applications; varying security requirements; the nature
of shared resources; and the continuing evolution of HPC systems.

Draft SP 800-223 provides guidance on standardizing and
facilitating the sharing of HPC security postures by introducing a zone-based
HPC system reference model that captures common features of HPC systems and
serves as a foundation for a system lexicon. The draft also discusses HPC
system threat analysis, security postures, challenges, and recommendations.

The public comment period for this
initial public draft is open through April 7, 2022.
See
the publication
details
for a copy of the draft and instructions for submitting
comments. Additional information can be found at the NIST HPC Security
Working Group website
. A 3rd High-Performance Computing
Workshop
will be held March 15-16, 2023; see the event page
for more details and a registration link.


NOTE:
A call for patent claims is included on page ii of this document. For
additional information, see the Information
Technology Laboratory (ITL) Patent Policy–Inclusion of Patents in ITL
Publications
.

Read
More

NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices

 Lightweight electronics, meet the heavyweight champion for
protecting your information: Security experts at the National Institute of
Standards and Technology (NIST) have announced a victor in their program to
find a worthy defender of data generated by small devices. The winner, a group
of cryptographic algorithms called Ascon, will be published as NIST’s lightweight
cryptography standard later in 2023.

The chosen algorithms are designed to protect information created
and transmitted by the Internet of Things (IoT), including its myriad tiny
sensors and actuators. They are also designed for other miniature technologies
such as implanted medical devices, stress detectors inside roads and bridges,
and keyless entry fobs for vehicles. Devices like these need “lightweight
cryptography” — protection that uses the limited amount of electronic resources
they possess. According to NIST computer scientist Kerry McKay, the newly
selected algorithms should be appropriate for most forms of tiny tech.

Read More

VMware ESXi have come under attack

 Patch your VMware ESXi 

Servers running the popular
virtualization hypervisor VMware ESXi have come under attack from at least one
ransomware group over the past week, likely following scanning activity to
identify hosts with Open Service Location Protocol (OpenSLP) vulnerabilities.

Specifically, threat actors have
been taking advantage of unpatched systems vulnerable to CVE-2020-3992 and CVE-2021-21974 that, when
exploited, can allow remote code execution.

Of the incidents observed thus
far, a ransomware-as-a-service (RaaS) group known as Nevada, appears to
be responsible ― although their ransom note shares many similarities with
Cheerscrypt, a ransomware threat that targeted ESXi in early- to mid-2022.

Attend Microsoft Secure

 

Join
us for a new security digital event – Microsoft Secure on March 28, 2023 8:30
AM Pacific Time (UTC-08:00). Registration is now open.

Why join Microsoft Secure?

By
joining our very first Microsoft Secure, you’ll:

·       
Be
among the first to see what an AI-driven future means for cybersecurity.

·       
Gain
insights from experts, including
Vasu Jakkal, Bret Arsenault, Charlie Bell, Joy Chik,
and many
more.

·       
Get
actionable steps from breakout
sessions
on extended detection and response (XDR), multicloud
security, cloud-managed endpoints, Zero Trust, built-in security
configurations and more.

·       
Connect
with your peers and have your product and strategy questions answered by
Microsoft experts in a live
chat Q&A
.

Register now
to catch our upcoming announcements. Be sure to follow Microsoft Security on LinkedIn, Twitter, and Blog for the latest news and event
information.

Thank
you,

NIST Cloud Computing Forensic Reference Architecture: NIST Requests Public Comments on SP 800-201

 The initial public draft of NIST Special Publication (SP) 800-201,
NIST Cloud
Computing Forensic Reference Architecture
,
is now
available for public comment. This document addresses the need to support a
cloud system’s forensic readiness, which is the ability to quickly and
effectively collect digital evidence with minimal investigation costs.

The document presents a reference architecture to help users
understand the forensic challenges that might exist for an organization’s cloud
system based on its architectural capabilities, as well as the mitigation
strategies that might be required. The reference architecture is both a
methodology and an initial implementation that can be used by cloud system
architects, cloud engineers, forensic practitioners, and cloud consumers to
analyze and review their cloud computing architectures for forensic readiness.

The public comment period for this
initial public draft is open through March 31, 2023
. See
the publication
details
for a copy of the draft and instructions for submitting
comments.


NOTE:
A call for patent claims is included on page ii of this document. For
additional information, see the Information
Technology Laboratory (ITL) Patent Policy–Inclusion of Patents in ITL
Publications
.

Read
More

Proposal to Update NIST SP 800-38E, Using the XTS-AES Mode for Confidentiality on Storage Devices

 In August 2021, NIST’s Crypto Publication Review
Board announced the review of NIST Special Publication (SP) 800-38E,
 Recommendation
for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on
Storage Devices
. In response, NIST received public comments.

NIST proposes to update SP 800-38E to
address the editorial suggestions in the public comments. In particular, the
updated publication will mention the security vulnerability that results when
the two AES (sub)keys are improperly generated to be identical, as discussed in
Annex C.I of Implementation
Guidance for FIPS 140-3 and the Cryptographic Module Validation Program
.

The updated SP 800-38E would be published without a period of
public comment.

Submit your comments on
this decision proposal by March 10, 2023
. See the
full announcement,
which includes NIST’s rationale for this proposal and instructions for
submitting comments.

Read
More