Sponsored Post: Bart Lenaerts-Bergmans, Senior Product Marketing Manager, Intel, CrowdStrike Financially motivated criminal activities, aka “eCrime,” happen in waves. They come and go as adversaries develop new tools and target vulnerable victims. Similar to how investors track stock market activity using various indexes, CrowdStrike monitors eCrime using multiple observables and codifies the activity in the […]
Sponsored Post: Narendran Vaideeswaran, CrowdStrike Director, Product Marketing, Zero Trust.Ransomware is a dangerous and evolving threat to organizations of every size, industry and geography. As ransomware operators and affiliates refine and evolve their strategies, security teams must ensure they have the strongest, most proactive protections in place to defend against this threat. This year’s Verizon Data […]
Do you have a disaster recovery plan for ransomware? I mean, do you really have a plan? Could you tell me what it is in a paragraph if you had to? Could you lay out what happens in a step-by-step sequence in case of attack?Most people can’t answer all these questions with a “Yes.” That’s […]
One of the best ways to protect yourself against ransomware is through role playing. If you’re thinking Dungeons and Dragons right now, you’re actually on the right path—a ransomware tabletop exercise is essentially the cybersecurity version of that.We’ve posted a log of essential information around this topic, and present it here as a quick primer […]
Many admins wonder how susceptible Linux is to the scourge of ransomware. There’s a general belief—which is correct—that Linux is more secure by default than Windows. That leads to the incorrect belief among some that Linux systems are mostly invulnerable to ransomware. In fact, Linux ransomware is real, it's very dangerous, and it’s growing.We’ve published […]
Sponsored Post: Nick Lowe, CrowdStrike Director, Falcon OverWatch.Organizations of every vertical, size, and location can be targeted with a ransomware attack. Here’s what you need to know about how these threats are evolving.Ransomware activity continues to grow and evolve each year, putting all organizations at heightened risk of an attack. Security teams, the protectors of the enterprise, must […]