Data Protection June 27, 2017 Funny Money: Exploring the Connection Between Bitcoin and Ransomware 3 min read - Fraudsters obviously prefer to deal in digital currency to remain anonymous, but bitcoin and ransomware are also intertwined in other, more complex ways.
Endpoint June 22, 2017 Health Care Endpoint Hygiene: A Post-WannaCry Call to Action < 1 min read - The idea of employing basic endpoint hygiene to keep your data safe seems like a no-brainer. So why was the WannaCry ransomware attack so damaging?
Network June 9, 2017 Don’t Wait for the Next WannaCry — Update Your SMB Protocol Before It’s Too Late 2 min read - To defend your infrastructure against future exploits, it's critical to disable the insecure original version of the SMB protocol.
June 7, 2017 Cold Comfort: Outdated Software Puts Companies in the Hot Seat 2 min read - Outdated software offers familiarity for IT teams, but that's cold comfort when it comes to the hot seat of legal challenges and ransomware infections.
Network June 7, 2017 Using Network Insights to Stay One Step Ahead of Emerging Threats 3 min read - With the right network insights, analysts can deal with existing threats such as WannaCry, and quickly detect and respond to new attacks as they emerge.
Malware May 25, 2017 Unwrapping the Mystery: Did a Big, Slimy Internet Worm Make Hundreds of Organizations WannaCry? 6 min read - IBM X-Force revealed that WannaCry spread to its targets like a computer worm. But unlike a classic worm, it carried a malicious payload of ransomware.
Incident Response May 25, 2017 Incident Response: Planning for the Attack Before It Happens 2 min read - An effective backup strategy is simply one part of a larger security and incident response plan, which should be developed proactively.
Intelligence & Analytics May 24, 2017 Stopping Threats in Their Tracks With Proactive Monitoring 4 min read - An effective response to an advanced threat such as WannaCry can be broken down into two phases: vulnerability management and proactive monitoring.
Network May 22, 2017 Blocking Bad: The Importance of Blocking and Virtual Patching 2 min read - Blocking refers to the practice of deploying network security devices to block threats as they traverse the network.
May 22, 2017 A Real Tearjerker: Patch Problems Drive WannaCry Worries 3 min read - While Microsoft could have slowed the spread of WannaCry, the real problem lies in the widespread practice of deploying outdated software and systems.