Data Security, Enterprise Identity, Enterprise Security

The Ransomware Threat

December 22, 2022

The Ransomware Threat
Ransomware continues to be among the most critical risks facing organizations of all sizes. Attackers have perfected techniques and business models that will pose a challenge to even the best prepared organizations.

While the encryption of a high volume of computers on a network can potentially be mitigated by adequate backups, ransomware actors have discovered new avenues of extortion, such as threatening to release data stolen prior to encryption. While ransomware attacks are time consuming to perform, ransomware actors have managed to achieve scale through the introduction of “ransomware-as-a-service” operations, renting out their tools and infrastructure to other attackers in exchange for a cut of the profits.

Spotlight

FoxGuard Solutions, Inc.

"FoxGuard Solutions provides cyber security, regulatory compliance and industrial computing solutions for critical infrastructure entities and control system vendors. As a wholly-owned subsidiary of CCS-Inc., we are an operational technology (OT) company that delivers reliable, secure, and configurable solutions to solve technology and compliance challenges. FoxGuard has 33 years of experience in the design, manufacture, and life-cycle management of industrial Human Machine Interface (HMIs), Historians, and SCADA devices to offer field-tested solutions created specifically for Industrial Control System (ICS) environments. FoxGuard has over 10 years of cyber security consultation and architecture design expertise in the areas of vulnerability scanning, penetration testing, incident response, disaster recovery and continuing operations planning, and vulnerability mitigation."

OTHER WHITEPAPERS
news image

N-able N-central Security White Paper

whitePaper | June 22, 2023

As an integral component of your IT management system, N-able N-central® complements an organization’s existing security policies and infrastructures. N-able N-central consists of a number of components that were specifically designed to provide flexibility as well as to ensure the integrity of the security of the networks on which N-able Ncentral operates.

Read More
news image

Security Protocol and Data Model (SPDM) Architecture White Paper

whitePaper | September 26, 2022

This white paper presents an overview of the SPDM architecture, its goals, and a high-level summary of its use within a larger solution. The intended target audience for this white paper includes readers interested in understanding the use of SPDM to facilitate security of the communications among components of platform management subsystems.

Read More
news image

Proven Ways to Prevent Ransomware Attacks

whitePaper | September 22, 2022

Ransomware is one of the fastest-growing and most costly cyber threats. According to a recent Perimeter 81 survey of over 500 IT professionals, 76% of respondents reported that their company experienced an attack within their organization.

Read More
news image

Dispatcher Phoenix Security

whitePaper | December 16, 2022

The advancement of technology has transformed the MFP into a key element of a company’s document infrastructure and workflow; however, as the role of the MFP has changed, the risk of security breaches has increased as well. Ensuring document confidentiality, allowing for system authentication, and providing clear audit trails are now necessities in every document-intensive industry. The objective of this white paper is to describe how Konica Minolta’s Dispatcher Phoenix software application helps organizations comply with their security requirements.

Read More
news image

VIRSEC ® SECURITY PLATFORM

whitePaper | December 10, 2019

Advanced application attacks that weaponize at runtime (WRT) are increasingly putting businesses at risk. These attacks challenge application security by leveraging fileless malware, memory corruption and uncommon vulnerabilities to evade traditional security solutions. WRTs manipulate legitimate processes and enable stealthy execution of malicious code, resulting in data breaches, damaged infrastructure, and financial losses.

Read More
news image

How to Build and Mature Your AppSec Program

whitePaper | January 24, 2023

Achieving an optimal security posture for your business happens when technology, automation, infrastructure, architecture, and security policies are in alignment across the company. This white paper provides concrete strategies to mature your AppSec program and achieve code security at scale based on your organization’s needs.

Read More

Spotlight

FoxGuard Solutions, Inc.

"FoxGuard Solutions provides cyber security, regulatory compliance and industrial computing solutions for critical infrastructure entities and control system vendors. As a wholly-owned subsidiary of CCS-Inc., we are an operational technology (OT) company that delivers reliable, secure, and configurable solutions to solve technology and compliance challenges. FoxGuard has 33 years of experience in the design, manufacture, and life-cycle management of industrial Human Machine Interface (HMIs), Historians, and SCADA devices to offer field-tested solutions created specifically for Industrial Control System (ICS) environments. FoxGuard has over 10 years of cyber security consultation and architecture design expertise in the areas of vulnerability scanning, penetration testing, incident response, disaster recovery and continuing operations planning, and vulnerability mitigation."

Events