filmov
tv
BlueHat v17 || Securing Windows Defender Application Guard
Показать описание
Saruhan Karademir, Microsoft
David Weston, Microsoft
Windows Defender Application Guard (WDAG) brings the next generation isolation into the browser space. It merges the best of Hyper-V virtualization and Microsoft Edge sandboxing technologies to bring hardware-enforced isolation of untrusted websites from the user’s data and operating system. In this talk, we will walk through the WDAG security promise and architecture. We will explain how it was built from the ground up with security as the number one priority showcasing the architectural decisions that added layers of defense. Finally, we explore how Microsoft’s internal security teams engaged from the very beginning of this feature’s development, helping shape WDAG’s design, finding and fixing critical vulnerabilities, and building additional defense-in-depth layers before the product reached a single customer.
David Weston, Microsoft
Windows Defender Application Guard (WDAG) brings the next generation isolation into the browser space. It merges the best of Hyper-V virtualization and Microsoft Edge sandboxing technologies to bring hardware-enforced isolation of untrusted websites from the user’s data and operating system. In this talk, we will walk through the WDAG security promise and architecture. We will explain how it was built from the ground up with security as the number one priority showcasing the architectural decisions that added layers of defense. Finally, we explore how Microsoft’s internal security teams engaged from the very beginning of this feature’s development, helping shape WDAG’s design, finding and fixing critical vulnerabilities, and building additional defense-in-depth layers before the product reached a single customer.
BlueHat v17 || Securing Windows Defender Application Guard
BlueHat v17 Securing Windows Defender Application Guard
BlueHat v17 || Mitigations for the Masses: From EMET to Windows Defender Exploit Guard
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
BlueHat v17 || Born Secure. How to Design A Brand New Cloud Platform With A Strong Security Posture
Microsoft BlueHat v17 Security Conference
BlueHat v17 || Raising the Bar: New Hardware Primitives for Exploit Mitigations
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at Scale
BlueHat v17 || Don't Let Your Virtualization Fabric Become the Attack Vector
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunting
BlueHat IL 2018 - David Weston - Windows: Hardening with Hardware
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insights
BlueHat IL 2018 - Jordan Rabet - Browser Security Beyond Sandboxing
BlueHat v17 Mitigations for the Masses From EMET to Windows Defender Exploit Guard
BlueHat IL 2018 - Matt Graeber - Hi, My Name is 'CN=Microsoft Windows, O=Microsoft Corporation…...
BlueHat IL 2020 - Boris Larin - Retrospective on the Latest Zero-days Found in the Wild
BlueHat IL 2018 - John Lambert - The New Paradigm of Security Controls
BlueHat IL 2017 - Marina Simakov & Tal Be'ery - The Enemy Within...
BlueHat IL 2019 - Matt Miller -Trends, Challenges, and Strategic Shifts
BlueHat IL 2017 - Matt Swann - Defending the Cloud...
BlueHat v17 Born Secure How to Design A Brand New Cloud Platform With A Strong Security Posture
BlueHat v17 Dangerous Contents Securing Net Deserialization
BlueHat IL 2017 - John Lambert - Cyber in a World of Cloud
BlueHat IL 2018
Комментарии