Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Security Spotlight: Large Data Leaks, New COVID-19 Scams, and Fast Ransomware Attacks
Published: 11/23/2021

This blog was originally published on October 12, 2021 by Bitglass. Written by Jeff Birnbaum, Bitglass. Here are the top security stories from recent weeks: Twitch Leak Exposes Personal DataCox Media Group Confirms Ransomware AttackXgroup Attackers Offer to Hack EU Hospitals in COVID-19 Vaccine S...

Why Should Enterprises Move to a Zero-Trust Model?
Published: 11/12/2021

This blog was originally published by Unbound Security here. Written by Lior Levy, Unbound Security. Refer to Unbound Security's webinar on November 18, 2021 for more information about the security of cryptographic keys, which is discussed later in this blog. The introduction of new norms such as...

Security Spotlight: Critical Vulnerability Exploits and Patches, Plus Novel Attack Tactics
Published: 11/09/2021

This blog was originally published by Bitglass here. Written by Jeff Birnbaum, Bitglass. Here are the top security stories from September 2021: Cisco Patches Three Critical Vulnerabilities Impacting Wireless Controllers and SD-WAN.Critical VMware vCenter Vulnerability Exploited in the WildNew APT...

Learn How Ransomware Attacks Have Changed - And How Response Needs To, Too
Published: 10/22/2021

This blog was originally published by Mitiga here. Written by Ariel Parnes, Mitiga. Ransomware keeps hitting the news these days, filling headlines with stories about organizations struggling with disabled IT systems, inaccessible patient data, unavailable Wi-Fi, and general confusion. Ransomware...

7 Ways to Harden Your Environment Against Compromise
Published: 09/29/2021

This blog was originally published by Microsoft here. Written by Alan Johnstone, CRSP Senior Consultant and Patrick Strijkers, CRSP Cyber Security Architect, Microsoft. Here at the global Microsoft Compromise Recovery Security Practice (CRSP), we work with customers who have experienced disrupt...

Reduce Your Risk: Supply Chain Attacks and the Rise of Ransomware
Published: 09/16/2021

This blog was originally published by OneTrust here.Organizations are at risk of an attack on one of their vendors that may impact their day-to-day operations. Citing a recent major breach in the information technology industry as an example, it’s clear that by using ransomware hackers, malicious...

Coping With the Ransomware Threat
Published: 09/14/2021

This blog was originally published by Oracle here.Written by Eric Maurice, Oracle.News of successful large-scale ransomware attacks are becoming more frequent. In some instances, companies considered part of the U.S. Critical Infrastructure have been compromised and their normal operations have ...

Detecting When Ransomware Moves Into Your Cloud
Published: 09/09/2021

This blog was originally published on Vectra.ai With around 65,000 ransomware attacks expected this year in the US alone according to Yahoo! Finance, let’s just go out on limb here and say that folks are having a rough go at stopping these menacing occurrences. It doesn’t seem to matter which ...

Five Actions to Mitigate the Financial Damage of Ransomware
Published: 10/30/2020

By Eran Farajun, Executive Vice President at Asigra, Inc.Ransomware attacks have become a regular occurrence for organizations today, with events that are increasingly targeted, sophisticated, and costly. According to recent reports by the Federal Bureau of Investigation[1], cybercriminals are ta...

Ransomware Explained
Published: 08/18/2017

By Ryan Hunt, PR and Content Manager, SingleHopHow it Works — Plus Tips for Prevention & Recovery Ransomware attacks — a type of malware (a.ka. malicious software) — are proliferating around the globe at a blistering pace. In Q1 2017, a new specimen emerged every 4.2 seconds!* What makes ranso...

Ransomware 101
Published: 05/19/2017

By Jacob Serpa, Product Marketing Manager, BitglassUnless you’ve been living under a rock for the last few weeks, you know that there has been a notable increase in cyberattacks around the world. Hackers have been spreading a type of ransomware called “WannaCry” via emails that trick recipients t...

Windows 10 Steps Up Ransomware Defense
Published: 01/17/2017

By Jeremy Zoss, Managing Editor, Code42Here’s some good news for the countless businesses getting ready for the migration to Windows 10: Microsoft recently announced that its Windows 10 Anniversary Update features security updates specifically targeted to fight ransomware. No defense is completel...

Three Lessons From the San Francisco Muni Ransomware Attack
Published: 12/22/2016

By Laurie Kumerow, Consultant, Code42On Black Friday, a hacker hit San Francisco’s light rail agency with a ransomware attack. Fortunately, this story has a happy ending: the attack ended in failure. So why did it raise the hairs on the back of our collective neck? Because we fear that next time ...

Fight Against Ransomware Takes to the Cloud
Published: 11/14/2016

By Raj Samani, EMEA CTO, Intel Security“How many visitors do you expect to access the No More Ransom Portal?”This was the simple question asked prior to this law enforcement (Europol’s European Cybercrime Centre, Dutch Police) and private industry (Kaspersky Lab, Intel Security) portal going live...

Personalized Ransomware: Price Set by Your Ability to Pay
Published: 11/11/2016

By Susan RichardsonSmart entrepreneurs have long employed differential pricing strategies to get more money from customers they think will pay a higher price. Cyber criminals have been doing the same thing on a small scale with ransomware: demanding a larger ransom from individuals or companies f...

Five Prevention Tips and One Antidote for Ransomware
Published: 10/25/2016

By Susan Richardson, Manager/Content Strategy, Code42During National Cyber Security Awareness Month, understanding the ins and outs of ransomware seems particularly important—given the scandalous growth of this malware. In this webinar on ransomware hosted by SC Magazine, guest speaker John Kinde...

Ransomware: Just Say No to Stronger Scare Tactics
Published: 10/04/2016

By Susan Richardson, Manager/Content Strategy, Code42Ah, those ingenious cyber criminals. They keep coming up with ever more frightening ransomware threats. JIGSAW warns victims it will delete files every hour until they pay $150 USD in bitcoins. Chimera threatens to publish the victim’s files on...

EFSS Spreads Ransomware; Endpoint Backup Guarantees Recovery
Published: 09/14/2016

By Kyle Hatlestad, Principal Architect, Code42One of the objections I’m hearing more and more is, “Why do I need backup when I have Microsoft OneDrive for Business (or Google Drive, Box or Dropbox for Business)?” On the surface, it may seem like endpoint backup isn’t needed because with an enterp...

WSJ Warns of Ransomware—Misses the Obvious Solution
Published: 09/09/2016

By Susan Richardson, Manager/Content Strategy, Code42Read through the recent Wall Street Journal ransomware article and you’ll find some great stats on the growing threat and cost. One thing you won’t find: the word “backup.” We’re happy to see ransomware finally getting the attention it deserves...

Ransomware Growing More Common, More Complex; Modern Endpoint Backup Isn’t Scared
Published: 08/05/2016

By Susan Richardson, Manager/Content Strategy, Code42The growing ransomware threat isn’t just about more cybercriminals using the same cryptoware tools. The tools themselves are rapidly growing more sophisticated—and more dangerous.Ransomware growing exponentially, with no signs of slowing A new ...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.