ASL Airlines France Builds Multi-level Ransomware Defense Strategy with Rubrik Cloud Data Management and Radar

February 14, 2019

FOR ENTERPRISES TODAY, RANSOMWARE ATTACKS ARE A MATTER OF “WHEN,” NOT “IF” Ransomware attacks are intensifying in scale and sophistication. A recent NTT Security survey revealed that ransomware attacks rose 350 percent in 2017 over the previous year.1 Nearly 75% of companies infected with ransomware suffer two days or more without access to their files while 33% go five days or longer.2 Global damage costs from ransomware attacks are predicted to reach $11.5 billion annually by 2019.3 The NotPetya ransomware attack on TNT Express in 2017 cost FedEx $300M and took the IT team more than a month to recover to its normal operational state.

Spotlight

Flowtraq

FlowTraq is a powerful, low-cost NetFlow analysis application for SaaS, Cloud, or On-premise network monitoring and security alerting. FlowTraq helps network security engineers detect network traffic anomalies, data breaches, DDoS attacks, risks to servers storing intellectual property, nation state backed intrusions; and social engineering attacks.

OTHER WHITEPAPERS
news image

Webex App Security Cloud Collaboration Security Technical Paper

whitePaper | November 24, 2022

Webex is a cloud collaboration platform that provides messaging, calling, and meeting features. The Webex App is a client application that connects to this platform and provides a comprehensive tool for teamwork. Users can send messages, share files, make calls, and meet with different teams, all in one place. This security technical paper provides an overview of the security features of Webex App running on Windows, Mac, iOS, Android, Linux, ChromeOS, and Web.

Read More
news image

IoT Cybersecurity vision 2018-2019

whitePaper | November 6, 2019

The emergence of IoT – the networked connection of people, process, data and things – is expected to significantly grow the number of connected devices worldwide, from billions of units we have today, to tens of billions of units expected to be deployed in the coming years as stated by several analysts.

Read More
news image

Leading Cybersecurity in Higher Education

whitePaper | February 11, 2023

Higher-education institutions are experiencing a high volume of cyberattacks and greater vulnerability to threats. Today’s educational technology environments connect a variety of endpoints—laptops, desktops, student management data, and email servers. They use Internet-of-Things (IoT) devices for managing environmental controls, security cameras, and door alarms. Both ends of the education spectrum gather, store, and use personal data from students and staff—and if they collect it, they must also protect it. As a result, schools need dedicated, skilled, and experienced executive leadership that is empowered, resourced, and responsible for campuswide cybersecurity issues.

Read More
news image

Security Operations Maturity Model

whitePaper | February 20, 2020

As the threat landscape continues to evolve, your cybersecurity efforts must follow suit. With your security operations center (SOC) at the core of your offense against threats, you must ensure that it can handle anything that comes its way. To be effective, you need to mature your SOC to stop threats early — before damage occurs. Whether your SOC is a virtual team of two to three or a 24x7 operation, maturing your security operations capabilities will help you achieve a faster mean time to detect (MTTD) and mean time to respond (MTTR) to cyberthreats. This white paper explores LogRhythm’s Security Operations Maturity Model (SOMM), which explains how to measure the effectiveness of your security operations. Through the model, you can learn how to mature your security operations capabilities, improving your resilience to cyberthreats.

Read More
news image

The Definitive WFH Security Checklist: 10 Easy Steps to Safer Remote Access

whitePaper | September 15, 2022

Providing secure, fast remote access is a top priority as the modern workforce has become predominantly remote. Working from home (WFH) or outside the office was once a choice or a stopgap measure, but today, it’s critical for business agility.

Read More
news image

Cybersecurity Whitepaper 2018

whitePaper | December 12, 2019

Most of the Small to medium-sized companies are unaware about the ways in which they’re vulnerable. More than 45% mistakenly believe they’re not a viable victim. They are just too small a target in comparison to larger organizations and tend to have a blind eye towards the cyber threats they face, which is in sharp contrast to what attackers think.

Read More

Spotlight

Flowtraq

FlowTraq is a powerful, low-cost NetFlow analysis application for SaaS, Cloud, or On-premise network monitoring and security alerting. FlowTraq helps network security engineers detect network traffic anomalies, data breaches, DDoS attacks, risks to servers storing intellectual property, nation state backed intrusions; and social engineering attacks.

Events