Posted by: kurtsh | September 19, 2022

VIDEO: “How to compromise Windows 10 & how Windows 11 protects against this”

I guess I forgot to post this a year ago to this blog.  Shame on me. 

Dave Weston, Microsoft Vice President of Enterprise OS Security & noted “Hacker-in-Chief” at Microsoft, did a demo where he demonstrated how Windows 10 (and prior Windows releases) can be compromised either remotely or with physical access… and how Windows 11 protects against such attacks.

imageStay ahead of external and internal threats — and balance performance, reliability, and security with Windows 11. Dave Weston, Windows security expert, joins Jeremy Chapman to share the rationale behind hardware requirements and how they provide significantly more protection against today’s most sophisticated malware and attacks.

Cyber attacks are at an all time high. Many of the optional or high-end security controls from Windows 10 are now on by default and required on new machines with Windows 11. The Zero Trust security model is baked into Windows 11, from the silicon on the board itself, to the actual boot process, your login as a user, and the apps you use in your Windows session every day.

  • See the sites that hackers use, and find out if your organization is exposed.
  • Protect Windows from remote and in-person attacks with Virtualization-based Security.
  • UEFI, Secure Boot and Trusted Boot stop rootkits or bootkits.
  • Secure encryption keys, user credentials, and sensitive data behind a hardware barrier. Windows 11 requires TPM 2.0 on new installs by default.

Watch the video here:


%d bloggers like this: