In Part One of my series on ransomware tabletops, a company was caught unprepared when hit with a real ransomware attack. Fortunately for them, their tape backups weren’t affected by th
What’s worse than being hit by a ransomware attack out of the blue? In early December, a Canadian organization discovered the answer in the worst possible way: get ransomed by a second, ent
I’m Lindsay, a malware analyst and reverse engineer, with a special enthusiasm for obfuscation and anti-reverse engineering techniques used in malware! I am also a woman in the field of cyb
For the longest time ransomware attackers stuck to extorting ransoms by encrypting the files of victims in return for an “unlock” key. As backup and disaster recovery made that less effec
Despite the seismic transition to cloud computing, 90% of Global Fortune 1,000 companies still rely on on-premises Active Directory (AD) for authentication and access management. While startu
Sponsored Post – Ransomware Recovery How a focus on recovery changes the outcome of ransomware attacks Data is one of the most valuable resources in business these days, and it is at th
Active Directory (AD) is at the heart of Windows networks. That means AD is also a prime target for ransomware actors, who would love nothing more than gaining control over it. The good news
It’s a tall order to keep your entire enterprise free of ransomware. The perpetual headlines concerning such attacks over the past couple years are a constant reminder of that. While you sh
Sponsored Post It’s no secret: the frequency of cyberattacks is on the rise. Enterprise IT and security leaders are facing a “crisis of trust” as mainstream software providers seemingly