Resources

Blog

WannaCry: What’s in a name? Confusion.

The WannaCrypt ransomware was nothing special. Companies were done in by nasty software exploits and endemic insecurity in the form of unpatched and unpatchable legacy systems.
Blog

The Incident Response Taxonomy

What should you do following a cybersecurity breach? Fortune 100 Incident Response expert Tim Bandos explains one of the key tiers of an incident response classification framework: the incident taxonomy.
Blog

Kelihos and the Ransomware Ecosystem

Botnets have been a serious problem on the web for more than 15 years, and as the network has changed, botnet operators have had to adapt in order to continue making money. While launching DDoS attacks on demand once was the main revenue stream for these cybercriminals, things have changed in recent years to include the paid installation of ransomware, banking trojans, and other types of malware.
On-Demand Webinar

Solving the Top 5 GDPR Challenges

GDPR impact goes beyond Europe. Organizations across the globe need to take action if they process data on EU citizens. By now, companies should be well into their GDPR preparation, which also means many are now bumping into problems. With the deadline for compliance approaching, how should organizations resolve these issues? Join experts from Digital Guardian and Boldon James to learn about the...