Know Thy Enemy: Threats to Cyber Resilience
April 2 | Register Now! "If you know the enemy and know yourself, you need not fear the result of a hundred battles.” – Sun Tzu. Threat actors are the enemy to your operational resilience and ability to survive. Knowing their strategy and tactics will help you resist and recover from their malicious actions and keep critical workloads available. In this webinar, you’ll learn: Exploits and techniques your organization will face How AI is accelerating these threats Counter-measures to face the onslaught Register Now!58Views0likes0CommentsThe Foundations of Cyber Resilience: Visibility and Indelibility
February 24 | Register now! Ransomware and operational risk haven’t gone away, yet many organizations still overlook the fundamentals that provide the strongest protection. In this back-to-basics webinar, we’ll break down how Pure Storage SafeMode™ Snapshots and Pure1® security assessments work together to form a resilient last line of defense for your data. In this live demonstration, you’ll see how they protect data integrity, accelerate recovery, and simplify security operations. Key takeaways: How immutable SafeMode Snapshots protect data from ransomware and insider threats Best practices for snapshot policies that balance recovery speed and operational efficiency What “secure by default” looks like when these features work together in real environments Register Now!55Views0likes0CommentsEverything Ransomware: Ransomware Live
Check it out! Really interesting tracking of everything related to ransomware. https://www.ransomware.live/ Ransomware Live is a real-time intelligence site tracking active ransomware groups, victims, leaks, and extortion activity, helping security teams monitor threats, trends, and attacker behavior worldwide.58Views1like0CommentsRansomware attacks are NOT going away
Here is why ransomware attacks are persistent and unlikely to disappear: 1. High Profitability and Low Risk for Criminals Ransomware is fundamentally a business model for organized crime, and it is overwhelmingly successful and profitable. Low Barrier to Entry: The rise of Ransomware-as-a-Service (RaaS) means even novice criminals can purchase sophisticated malware and infrastructure. This franchise model ensures high attack volume regardless of law enforcement efforts. Guaranteed Revenue Stream: The evolution to multi-extortion (encrypting data and stealing it) ensures that victims are forced to pay—either to regain system access or to prevent catastrophic data leaks and regulatory fines. This dual leverage guarantees profit even if the victim has backups. Anonymity: The use of cryptocurrency for payments, coupled with geopolitical safe zones for many RaaS groups, keeps the risk of prosecution extremely low for the attackers. 2. Attackers Are Outpacing Traditional Defenses The tactics used by ransomware groups are specifically designed to neutralize traditional defense and recovery measures: Targeting the Supply Chain: Attackers are finding success by targeting trusted vendors and IT providers to compromise dozens of companies simultaneously, making defense exponentially harder for individual organizations. Attacking Backups: Modern ransomware campaigns specifically target accessible backups to delete them or malware-infect them, eliminating the victim’s recovery option and forcing them to pay the ransom. AI for Stealth and Speed: The adoption of AI is accelerating reconnaissance and stealth, dramatically compressing the time between network access and payload deployment. Attackers can move faster than human defenders can react. 3. Cyber Resilience is the New Standard The industry has shifted its mindset from trying to achieve absolute prevention (which is impossible) to guaranteeing resilience. This shift acknowledges the persistence of ransomware. The focus is now on ensuring organizations can: Anticipate and detect threats early (low MTTD). Withstand the attack without immediate operational collapse. Recover guaranteed clean data within minutes (low MTTR). Ransomware will not disappear until the criminal model becomes unprofitable, and current data shows that attackers are highly successful and rapidly adapting their strategies.38Views0likes0CommentsMFA Downgrade Attacks: Good to know.
Short article on MFA downgrade attacks; provides the basics on what it is and how to defend. Good to know for considering your own policies and processes when folks lose devices. https://www.scworld.com/perspective/why-mfa-downgrade-attacks-could-be-the-next-ai-security-crisis120Views0likes1CommentWhen Security Awareness Fails: Effective Cyber Recovery
October 30 | Register Now! Based on Ponemon Institute research, cyber incidents reveal that recovery times are not hours, but days with organizations frequently suffering data loss. Despite the best efforts of cybersecurity awareness and security investments, organizations still need to amplify their recovery strategies to minimize business disruption and data integrity. This session will explore: How organizations should continue investing in cybersecurity Why measure cyber recovery in minutes and hours vs. days Using new cyber resilient storage capabilities to speed up recovery The cross-functional and cross-technology cyber recovery process and the importance of rehearsals and testing Register Now!79Views0likes0CommentsWhere to get cyber news: Useful links.
Here are a number of publications I use to 'try' to keep up with everything happening in cyber security: https://thehackernews.com/ https://www.darkreading.com/ https://www.scworld.com/ https://www.securityweek.com/ https://www.cybersecuritydive.com/ https://www.infosecurity-magazine.com/67Views3likes0Comments