Preventing WannaCrypt Type of Cyberattacks with Host Checker

We have grown accustomed to computer viruses but the latest WannaCrypt worm attack was a Friday surprise that took the world by storm. It claimed more than 200,000 victims in less than 48 hours, according to one count by Europol, Europe’s policing agency. The Associated Press also reported that the ransomware spread to 150 countries, and victims included Chinese gas stations, Japanese broadcasters, British hospitals, and German railways. WannaCrypt is particularly malicious because it takes just one person to click on an infected link or email attachment to spread the virus.

Spotlight

Cursive Security

Cursive Security provides intelligence-driven cybersecurity services. We analyze the tools, tactics, and procedures of cyber adversaries and prioritize objectives based on actionable intelligence. We succeed by tackling security as a strategic process that requires continuous adaptation and advancement. This approach empowers enterprises by developing and operationalizing security programs that measurably improve security posture, mitigate risk, and by building a defensive architecture.

OTHER WHITEPAPERS
news image

Open RAN MoU progress update on maturity, security and energy efficiency

whitePaper | September 29, 2022

As the momentum behind Open RAN continues to grow, it is natural that relevant experts and decision makers want to understand its progress and how the Open RAN industry has risen to the challenges, in particular relating to maturity, security and energy efficiency. Over the course of 2022, Open RAN MoU Operators encouraged an open dialogue about Open RAN and have taken steps to understand concerns and address valid questions. This paper represents a progress report that helps to showcase the gains and set the agenda for 2023. In summary:

Read More
news image

Cloud Privilege Broker 22.1 Security Whitepaper

whitePaper | September 15, 2022

There is complete end-to-end encryption from BeyondInsight with Cloud Privilege Broker through to the Cloud Platform Infrastructure. Cloud Privilege Broker services communicate with each other through distributed queues over TLS encryption.

Read More
news image

OT/IoT Security Report Cyber War Insights, Threats and Trends, Recommendations

whitePaper | August 30, 2022

Nozomi Networks Labs is dedicated to reducing cyber risk for the world’s industrial and critical infrastructure organizations. Through its cybersecurity research and collaboration with industry and institutions, it helps defend the operational systems that support everyday life. The Labs team conducts investigations into industrial device vulnerabilities and, through a responsible disclosure process, contributes to the publication of advisories by recognized authorities.

Read More
news image

Data Services Cloud Console Security Guide

whitePaper | March 2, 2023

Cloud-based management from Hewlett Packard Enterprise offers many advantages for both data infrastructure and the data itself. Data Services Cloud Console (DSCC) is the HPE cloud-based application for current and future data and storage management.

Read More
news image

Acronis Cyber Protection Operation Centers Report: Ransomware dominates threat landscape

whitePaper | November 24, 2022

Acronis was the first company to implement complete integrated cyber protection to protect all data, applications and systems. Cyber protection requires the researching and monitoring of threats, as well as abiding by the five vectors of safety, accessibility, privacy, authenticity and security, or SAPAS. As part of the strategy, we’ve established four Cyber Protection Operation Centers (CPOCs) around the world to monitor and research cyberthreats 24/7.

Read More
news image

Security, privacy, and compliance with Illumina Connected Analytics

whitePaper | August 23, 2022

Advances in next-generation sequencing (NGS) technologies have dramatically increased the amount of data generated, creating challenges in data analysis and interpretation. Illumina Connected Analytics (ICA) is a secure genomic data platform to operationalize informatics and drive scientific insights. ICA provides an extensible platform with a rich set of RESTful application program interfaces (APIs) and a command-line interface (CLI) tool to maximize workflow efficiency.

Read More

Spotlight

Cursive Security

Cursive Security provides intelligence-driven cybersecurity services. We analyze the tools, tactics, and procedures of cyber adversaries and prioritize objectives based on actionable intelligence. We succeed by tackling security as a strategic process that requires continuous adaptation and advancement. This approach empowers enterprises by developing and operationalizing security programs that measurably improve security posture, mitigate risk, and by building a defensive architecture.

Events