Simulating the Enemy
Listen now
Description
How does that old saying go? Keep your friends close and keep your understanding of a threat actor’s underlying behavior and functionality of tradecraft closer? As new tools are developed and implemented for individuals and businesses to protect themselves, wouldn’t it be great to see how they hold up against different attacks without actually having to wait for an attack to happen? Microsoft’s new open-source tool, Simuland, allows users to simulate attacks on their own infrastructure to see where their own weaknesses lie.   In this episode of Security Unlocked, hosts Natalia Godyla and Nic Fillingham sit down with Roberto Rodriguez, Principle Threat Researcher for the Microsoft Threat Intelligence Center (MSTIC) and Simuland’s developer, to understand how the project came to life, and what users can expect as they use it.   In This Episode You Will Learn:   How community involvement will help Simuland grow  How individuals can use Simuland to see examples of actions threat actors can take against their infrastructure  What other projects and libraries went into Simuland’s development  Some Questions We Ask:   What exactly is being simulated in Simuland?  What do does Roberto hope for users to take away from Simuland?  What is next for the Simuland project?    Resources:   Roberto Rodriguez’s LinkedIn Roberto’s blog post, SimuLand: Understand adversary tradecraft and improve detection strategies Roberto’s Twitter: Cyb3rWard0g Microsoft Security Blog Nic’s LinkedIn Natalia’s LinkedIn    Related: Listen to: Afternoon Cyber Tea with Ann Johnson Listen to: Security Unlocked: CISO Series with Bret Arsenault  Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network. 
More Episodes
The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; digital currencies are here to stay, no matter how many times you have to...
Published 02/16/22
Published 02/16/22
Ransomware attacks have never been so successful. The returns from these attacks are soaring and only becoming easier to conduct. In chapter two of the Microsoft Digital Defense Report, the growing threat of cybercrime is covered in great detail. As we continue to go over the MDDR, it's more...
Published 02/02/22