Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Does a Ransomware Attack Constitute a Data Breach? Increasingly, It May

Historically, one difference between a company victimized by ransomware and those hit with a hacking intrusion that resulted in stolen data was that in a ransomware attack, the data wasn’t actually stolen, but was encrypted so that the victim would have to pay a ransom to regain access. Unlike traditional data thefts, ransomware—the theory went—didn’t really steal data. It encrypted it so that the authorized users couldn’t get to it unless a ransom was paid.

Network Security: The Journey from Chewiness to Zero Trust Networking

Network security has changed a lot over the years, it had to. From wide open infrastructures to tightly controlled environments, the standard practices of network security have grown more and more sophisticated. This post will take us back in time to look at the journey that a typical network has been on over the past 15+ years. From a wide open, “chewy” network, all the way to zero trust networking. Let’s get started.

On Sale! Access to your Crown Jewels

Remote Desktop Protocol (RDP) is a communication protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection[1]. Once connected, the remote user will be able to communicate with the machine using their input devices, keyboard and mouse, and to have their screen displaying the output of their actions – as if they were physically connected. Simply put, gaining access to your crown jewels.

Egnyte: The Leader in Cloud Content Collaboration, Governance and Security

One unified platform to govern and secure content everywhere. Egnyte is the only all-in-one platform that combines data-centric security and governance, AI for real-time and predictive insights, and the flexibility to connect with the content sources and applications your business users know and love — on any device, anywhere, without friction. See why over 16,000 customers choose Egnyte to boost productivity, reduce complexity, and protect their unstructured data.

Devo Security Operations - Command and Control Use Case

Table of Contents:

00:00 - Introduction
00:08 - C&C concept
00:31 - C&C types
01:02 - C&C in SecOps
01:41 - C&C in SecOps: alerts
02:23 - C&C in SecOps: Triage
02:45 - C&C in SecOps: new investigation
03:14 - C&C in SecOps: associations
04:09 - C&C in SecOps: related alerts
04:49 - C&C in SecOps: Hunting
05:18 - C&C in SecOps: identify outbound traffic

An Analysis of Cyber Attack Costs on the Life Sciences Industry

2020 provided a perfect storm for cybercriminals to extort record amounts from vulnerable businesses. Recent reporting has identified life sciences companies as being particularly attractive to target as they have valuable intellectual property information and have enough funding to pay high ransom demands. The pharmaceutical industry is currently at the top of the most targeted industries for such attacks.

The Changing Dynamics of Cyber Insurance

Almost exactly a year ago, cybersecurity professionals were locked in a heated debate about insurance. While some were keen to point out that the future of the industry would need to include some form of insurance market, others argued that cyber insurance would never be worth the premiums, especially given the inherently volatile nature of cybersecurity. The pandemic has changed all of that.