October 2019 | SC Media

Print Issue: October 2019

Skybox Security Platform 10.0.200

Skybox Security Platform enhances scan data by applying compliance to the entire hybrid network and serving as a single source of truth of what happens after a vulnerability is found. It can be deployed on a hardware appliance, as a virtual appliance or installed via AMI through AWS. Organizations also can deploy it on VMware…

First Look: YubiKey 5

Product Name: YubiKey 5Company: YubicoPricing: starts at $45 per key What it does: Provides one touch two factor authentication for a wide variety of platforms and websites. What we liked: Collaboration with Microsoft and Google delivers out of box integration with applications and platforms supported by these industry leading solution providers. The Bottom Line: The…

Tufin Technologies Tufin Orchestration Suite 19-2

Tufin Orchestration Suite, which takes a polycentric approach to risk management to maximize both agility and security with security policy orchestration, consists of three components: SecureTrack, SecureChange and SecureApp. SecureTrack provides an application driven perspective and leverages the automation policies of all underlying products. A comprehensive firewall and policy management solution, it ensures policies have…

Ransomware: To pay or not to pay

The crudely written ransom notes in movies 20-30 years ago may have been replaced by more modern, digital missives – like a texted photo a la Liam Neeson’s “Taken” – but the message remains the same: Pay up or else.   That is the quandary business owners, municipal governments, school administrators and even librarians are now…

Are you prepared for a ransomware attack?

Literally countless life or death situations were at stake. A large medical provider recently was hit with a ransomware attack request for $3.5 million. “They had to pay,” explains Ondrej Krehel, CEO of New York-based LIFARS, which managed the response. The medical company’s critical servers for its 300 locations were breached, and recovery from the…

Talkin’ about an EVOLUTION…

In cybersecurity terms, is there anything more Darwin-esque than ransomware? Small variations in targets, attacks, points of entry, payout and even attacker priorities have saved it from extinction and increased its ability to compete, survive and reproduce just as Charles Darwin contended organisms developed. Unfortunately, though, those attacks have evolved into a greater menace for…

Captives of industry

Ransomware is everywhere. It plagues businesses big and small, across the globe, even in the most hidden corners. Still, over the past year, certain industries have been feeling the pain more than others. A Malwarebytes quarterly report released last August found that detections of ransomware among organizations rose 365 percent from Q2 2018 to Q2…

Acuity Risk Management STREAM Integrated Risk Manager 5.4

STREAM is a risk management and compliance solution that gives visibility into risk levels by quantifying cyberrisks. It projects ROI by showing the potential repercussions of identified risk, quantifying the value gained through security expenditures and prioritizing risks based on the remediation costs. The solution is highly configurable, scalable and framework-agnostic, offering real-time updates and…

AlgoSec Security Management Suite 2018.2 8.2

AlgoSec Security Management arms analysts with actionable visibility across environments to simplify policy management with zero-touch automation capabilities that reduce human errors, identify misconfigurations and ensure continuous compliance. It manages complex network security policies throughout the entire policy lifecycle. This solution suite consists of three primary components: BusinessFlow, FireFlow and Firewall Analyzer. A fourth optional…

IllenaArmstrong

Ransomware grows more lucrative

At a fairly recent conference for financial institutions that was offering open, candid discussions and interactive training for cybersecurity leaders in attendance, ransomware was THE hot topic. In fact, this rising attack-type merited a half day of training that involved numerous three-letter agencies. The reasons for this are simple. As SC Media journalists this month…

Next post in Ransomware