Ransomware Tactics & Detection Techniques

Ransomware is one of the most pervasive and destructive threats that organizations and individuals face today. It is malware that takes your computer or its data hostage and demands the payment of a ransom to return control of the computer or restore the data. Over the years, ransomware evolved to take many forms, the goal being the same: extort a ransom from the victims.

Spotlight

Graphite Software

Graphite is the creator of Secure Spaces, an Android virtualization and cloud management solution that has been deployed to millions of smartphones with brand names such as Coolpad, Blackphone, Alcatel One-Touch and Fantome Arcane. Secure Spaces enables user privacy and multiple identities, including its famous multiple hidden virtual phones on one device. It also enables interesting new consumer and mobile advertising use cases via branded or sponsored "Spaces". The company is rapidly growing and is headquartered in Ottawa with offices in California and Beijing. Come join the team and redefine how people interact with their phones, while maintaining their privacy.

OTHER WHITEPAPERS
news image

Identity and Zero Trust: A Health-ISAC Guide for CISOS

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

Protecting Against Sophisticated Bot Attacks

whitePaper | November 18, 2022

Bot-generated attacks have risen in visibility, and defending against these attacks is now a priority for most organizations. Yet challenges persist in accurately identifying bot traffic; protecting a distributed, heterogeneous application environment from these attacks; and minimizing the impact to legitimate users while doing so. To address these issues, intelligent protection against sophisticated bots is a necessity. This should include strong analytics coupled with human expertise, a frictionless user experience, and consistent coverage across different architectures and platforms. F5 Distributed Cloud Bot Defense, built on Google Cloud, supports these requirements and can help prevent fraud and abuse against public-facing web applications.

Read More
news image

The Definitive WFH Security Checklist: 10 Easy Steps to Safer Remote Access

whitePaper | September 15, 2022

Providing secure, fast remote access is a top priority as the modern workforce has become predominantly remote. Working from home (WFH) or outside the office was once a choice or a stopgap measure, but today, it’s critical for business agility.

Read More
news image

IoT Application Provisioning for Security Using FDO and TPM

whitePaper | December 29, 2022

The Internet of Things (IoT) offers the appealing possibility of harnessing millions of devices that measure or modify real world things and allows processes to be optimized. There are many opportunities: thermostats optimized for tomorrow’s weather, shipping containers optimized for packing before their contents arrive, assembly lines that reconfigure automatically for each item, street lighting adjusted to make streets safer, and so on.

Read More
news image

API Security: Best Practices for Vulnerability Mitigation

whitePaper | June 6, 2023

API Security: Best Practices for Vulnerability Mitigation provides a hands-on approach to mitigate security vulnerabilities in APIs. The paper emphasizes the importance of implementing security measures that protect the API and underlying infrastructure. The paper identifies various security vulnerabilities that can arise in APIs and provides detailed guidelines for securing them. These guidelines cover authentication, authorization, input validation, output encoding, error handling, logging, and auditing.

Read More
news image

Optimizing Your Zero Trust Environment for Secure Video Conferencing

whitePaper | July 4, 2023

We’ve all heard the buzz around the virtual water cooler that Zero Trust Architectures are The Next Big Thing in network security, but what do we really know about them? And, perhaps more relevant to our discussion today, why should you care? This white paper looks at how and why Zero Trust (ZT) defines a data-centric security model and what that means in a real-time production environment. We build on that conversation to take a deeper look at how Pexip's video conferencing platform integrates with your existing ZT strategy and can even give you some new ZT concept ideas to consider.

Read More

Spotlight

Graphite Software

Graphite is the creator of Secure Spaces, an Android virtualization and cloud management solution that has been deployed to millions of smartphones with brand names such as Coolpad, Blackphone, Alcatel One-Touch and Fantome Arcane. Secure Spaces enables user privacy and multiple identities, including its famous multiple hidden virtual phones on one device. It also enables interesting new consumer and mobile advertising use cases via branded or sponsored "Spaces". The company is rapidly growing and is headquartered in Ottawa with offices in California and Beijing. Come join the team and redefine how people interact with their phones, while maintaining their privacy.

Events