Techniques for Dealing with Ransomware, Business Email Compromise and Spearphishing

Phishing, spearphishing, CEO Fraud/Business Email Compromise (BEC) and ransomware represent a group of critical security threats that virtually every organization will encounter at some point – and most already have. While phishing actually started in the 1995-1996 time frame, it became a much more serious problem in the mid-2000s

Spotlight

Datashield

Datashield is the leading provider of Managed Security Services (MSS), and Managed Detection and Response (MDR), to middle market and enterprise customers. Datashield maintains a SOC 2 Type II Advanced Security Operation Center located in Scottsdale, AZ. 2009: Datashield was founded as leading edge Cyber Technology company by a joint investment between RSA, EMC and CEO Michael Malone. 2011: Datashield began offering an MSS solution around log based SIEM technologies. As the market evolved, the need for an MSS provider offering real time forensics and malware analysis emerged and DS expanded the offering. Datashield became the exclusive white labeled MSS solution for RSA Netwitness Security Analytics platform to RSA/EMC middle market and enterprise customers. 2012: Datashield reclaims the initial equity investment from RSA/EMC. Additionally, Datashield partnered with the Frank Keener Investments to buy back the investment from RSA /EMC. 2014: Datashield achieved SOC II Type 2 certificat

OTHER WHITEPAPERS
news image

Apple Platform Security

whitePaper | May 26, 2022

Apple designs security into the core of its platforms. Building on the experience of creating the world’s most advanced mobile operating system, Apple has created security architectures that address the unique requirements of mobile, watch, desktop, and home.

Read More
news image

Cybersecurity in the Cloud White Paper

whitePaper | July 1, 2023

Cloud services have changed the face of business, offering scalability, efficiency and cost savings not available with onpremises IT infrastructure. The cloud makes it easier for organizations to manage the ever-increasing amount of data passing through their systems, helping teams communicate and collaborate across different locations. By enhancing the ability to access and manage information, the cloud has introduced a new way of approaching productivity and security – and has transformed how we work.

Read More
news image

How to Prepare For & Respond to Ransomware in Operational Technology Environments

whitePaper | March 14, 2023

Targeted intrusions for gaining long-term access and collecting data about industrial control systems (ICS) are becoming much more frequent. Many of these attacks are about understanding the network and preparing for future activities without causing any immediate impact. The most recent Dragos Year in Review6 report shows that the ransomware groups Lockbit 2.0 and Conti were responsible for more than half of the observed ransomware attacks in industrial environments in 2021, and that these instances resulted in actions on objectives. These attacks have been observed in almost every industrial vertical, primarily targeting small to medium-sized organizations in manufacturing.

Read More
news image

2020 Cyber Security Predictions

whitePaper | January 28, 2020

This year there are some common themes that endure, so we’ll highlight these as “work in progress”. Transformations often take longer than 12 months to be identifi ed as necessary, to be executed and to become established. However, there are other themes emerging through a combination of drivers from audit, compliance security and governance that are now showing signs of infl uencing the way that cyber risks are managed in a much shorter timescale.

Read More
news image

Security, privacy, and compliance with Illumina Connected Analytics

whitePaper | August 23, 2022

Advances in next-generation sequencing (NGS) technologies have dramatically increased the amount of data generated, creating challenges in data analysis and interpretation. Illumina Connected Analytics (ICA) is a secure genomic data platform to operationalize informatics and drive scientific insights. ICA provides an extensible platform with a rich set of RESTful application program interfaces (APIs) and a command-line interface (CLI) tool to maximize workflow efficiency.

Read More
news image

Brivo Access Information Security White Paper

whitePaper | August 26, 2022

As a provider of physical security services, we at Brivo believe that information security is of paramount importance to maintaining the safety and security of your facilities, and the privacy of your data. That’s why information security has been a consideration since day one.

Read More

Spotlight

Datashield

Datashield is the leading provider of Managed Security Services (MSS), and Managed Detection and Response (MDR), to middle market and enterprise customers. Datashield maintains a SOC 2 Type II Advanced Security Operation Center located in Scottsdale, AZ. 2009: Datashield was founded as leading edge Cyber Technology company by a joint investment between RSA, EMC and CEO Michael Malone. 2011: Datashield began offering an MSS solution around log based SIEM technologies. As the market evolved, the need for an MSS provider offering real time forensics and malware analysis emerged and DS expanded the offering. Datashield became the exclusive white labeled MSS solution for RSA Netwitness Security Analytics platform to RSA/EMC middle market and enterprise customers. 2012: Datashield reclaims the initial equity investment from RSA/EMC. Additionally, Datashield partnered with the Frank Keener Investments to buy back the investment from RSA /EMC. 2014: Datashield achieved SOC II Type 2 certificat

Events