Jessica Payne

@jepayneMSFT

Security Person at Microsoft, currently in Windows Defender Security Research. Opinions are my own.

Vrijeme pridruživanja: listopad 2015.

Tweetovi

Blokirali ste korisnika/cu @jepayneMSFT

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jepayneMSFT

  1. Prikvačeni tweet
    11. pro 2017.

    Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI:

    Prikaži ovu nit
    Poništi
  2. 26. stu 2019.

    If you want to help make the security landscape make sense and protect customers from a wide range of threats by providing clarity and focus via Actionable Threat Intelligence - you still have time to apply to my team!

    Prikaži ovu nit
    Poništi
  3. 26. stu 2019.

    What wording did we change in our posting? Years of security experience from 5 to 3, but importantly the wording before was very Cyber Threat Intelligence specific - now it includes IR, forensics, IT admin, etc. because all those backgrounds are relevant and security experience.

    Prikaži ovu nit
    Poništi
  4. 26. stu 2019.

    None of the analyst/researcher job postings for the Defender Threat Intelligence team require a degree, because I don’t have one and it would be awkward to disqualify me from my own job.

    Prikaži ovu nit
    Poništi
  5. 15. stu 2019.

    How job postings are worded matters. We realized this post’s requirements wording prevented us from getting candidates from the diverse skill backgrounds we encourage & auto rejected based on years of experience. We fixed this, and here is the new link:

    Prikaži ovu nit
    Poništi
  6. 14. stu 2019.

    Ransomware is an economic problem - attackers use the same techniques of RDP brute force and lateral movement for years because they still work. Increasing operational security is not only possible using native/builtin tools, it’s becoming a new business continuity requirement.

    Prikaži ovu nit
    Poništi
  7. 14. stu 2019.

    Ransomware is often talked about with the same ‘superpower’ and malware focused narrative APTs are. Both are humans usually using psexec, GPOs, and stolen credentials to move laterally and deploy malware. Mitigations exist and networks can be hardened:

    Prikaži ovu nit
    Poništi
  8. 13. stu 2019.

    Do you want to work on my team and track threats via attacker behaviors to produce Actionable Threat Intelligence to make the world a more secure place (see thread) and also want a link to the job description that that doesn’t require you to login? :)

    Prikaži ovu nit
    Poništi
  9. 13. stu 2019.

    I talked about our team, how we grow people, and how our diverse backgrounds give us superpowers in the security space (and the career history of who is now one of our awesome analysts and teammates) in this talk if you want to know more:

    Prikaži ovu nit
    Poništi
  10. 13. stu 2019.

    If your background is Incident Response, malware analysis, or IT instead of “Threat Intelligence” - that’s OK! You should consider those skills applicable to the role. Role posted as Senior but if you can make a convincing case for your skills we can hire a more junior person.

    Prikaži ovu nit
    Poništi
  11. 13. stu 2019.

    We’re helping our teams that build our cross platform Defender engine understand the threat landscape as it applies to Macs, Linux, and Android - and how attacks in the cloud work and can be detected too.

    Prikaži ovu nit
    Poništi
  12. 13. stu 2019.

    We partner closely with the Microsoft Threat Experts and DART Incident Response teams, advising them on hunting for emerging threats, mitigation and recovery advice, and providing insights on ongoing campaigns and attacker techniques.

    Prikaži ovu nit
    Poništi
  13. 13. stu 2019.

    We produce the reports and mitigations in the Threat Analytics feature of Defender ATP - reports that we call ‘Actionable Threat Intelligence’ - which is also our motto. We want not just to report on threats, but teach people how to mitigate them.

    Prikaži ovu nit
    Poništi
  14. 13. stu 2019.

    What do we do here? Some recent projects included tracking the BlueKeep threat through its lifecycle, including this fun collaborative research project :

    Prikaži ovu nit
    Poništi
  15. 13. stu 2019.

    Do you want to work in a security research org with awesome people who thrive on collaboration? Do you want to change the way Threat Intelligence is produced and consumed to make the world more secure? Do you want to work with me? :) We’re hiring!

    Prikaži ovu nit
    Poništi
  16. 8. stu 2019.

    While BlueKeep absolutely can be used for lateral movement, it’s very likely to be used to replace RDP brute force in attacker arsenals. One unpatched forgotten system with Domain Admin service account or matching Local Admin passwords quickly leading to a Samas/LockerGoGa event.

    Prikaži ovu nit
    Poništi
  17. 7. stu 2019.

    Being able to work with security researchers to confirm their findings and share the insights and intelligence from the visibility we have into the threat landscape from our dataset is incredibly exciting and inspiring. I’m really proud to be part of my team and what we do.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet

    While we currently see only coin miners being dropped, we agree w/ the research community that CVE-2019-0708 (BlueKeep) exploitation can be big. Locate and patch exposed RDP services now. Read our latest blog w/ assist from &

    Poništi
  19. 6. stu 2019.

    Join session BRK2109 tomorrow at to see why I created the world’s saddest slide and how we can fix some of the problems of Cybersecurity by working together and embracing our curiosity.

    Prikaži ovu nit
    Poništi
  20. 30. lis 2019.

    I’ll be part of a session at Ignite next week on how we approach Threat Intelligence, Incident Response, and insight into our Microsoft Threat Experts service and the trends we see on customer networks. It will be recorded for anyone who can’t make it.

    Prikaži ovu nit
    Poništi
  21. 30. srp 2019.

    I’ll be presenting a public version of this talk at Africa HackOn!

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·