Patch Tuesday: Remediation for Microsoft CryptoAPI Vulnerability
Effectively patch Microsoft CryptoAPI software vulnerability in three steps to remediate risk.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
Technological progress cannot be undone, and Microsoft’s extended support is ending soon for two widely deployed products: Windows 7 and Server 2008. Microsoft wishes for everyone to upgrade to ensure security against vulnerabilities. But for asset owners, this represents a series of new questions or pain points if a host is physically deployed.
This Windows-host upgrade approach may involve using VMware V-Sphere Converter as an example to create “digital twins” or “virtual twins” from a stand-alone perspective, but other tools are available including Microsoft’s migration tooling.
In a vendor agnostic fashion, the process is broken up into five steps:
This isn’t an exhaustive guide, but it should help you get started with migrating to a virtualized deployment. However, this process might help you test legacy software in newer Operating Systems (OS) or convert systems to virtual ones so you can retire legacy equipment where possible.
Effectively patch Microsoft CryptoAPI software vulnerability in three steps to remediate risk.
Learn MoreWhen a software patch isn't an option, here's how to control your industrial environment to manage risk.
Learn MoreFrom an asset owner's perspective: Defining firmware and discovering embedded vulnerabilities to protect devices from exploitation.
Learn More