Category: Security

Defending Against Crypto-Ransomware with Netwrix

Hi, today we will discuss about data governance and more especially a software called: Netwrix Auditor. Netwrix Auditor is a visibility and governance platform that enables control over changes, configurations, and access in hybrid cloud IT environments to protect unstructured data regardless of its location. The platform provides security analytics to detect anomalies in user …

Continue reading

Advertisement

Conti initiates their attacks on Backup

Cyber groups (cartels) specifically target backup solutions in order to ensure that the victim has no other option except for paying the ransom. Conti group is particularly methodical in developing and implementing backup removal techniques (on-premise and cloud). The full analysis is available here (thanks to ADV INTEL) and is based on their actual proactive …

Continue reading

Advertisement

Secure IT Live #1 – Protect your Backup

Hi, I have the opportunity to participate in a live webcast in French for the first “Secure IT Live” (online event) between Veeam Software, ExaGrid, Quantum and Monaco Digital – Avangarde (Secure IT Live #1 – Protect your Backup). Topic: Building a backup architecture Secure by design (tips), and protecting against ransomware attacks. Join our …

Continue reading

Advertisement

Level up your Microsoft Office 365 Security

Last year, I had the opportunity to participate in a live session in French as official Varonis Speaker about Microsoft 365 Security (Varonis Elite member) at aOS Nice 2020 with Mickaël Lopes (Cyber Security Pre Sales Engineer @ Varonis). We are seeing an uptick in adversaries using a very tricky Man-in-the-Middle (MitM) attack to bypass …

Continue reading

Protect your Backup against Ransomware

Regular backups of all data, including data on file servers, infrastructure, and critical business applications should be performed. Keep in mind that these backups can also be affected by ransomware. Protect your backup against Ransomware. Indeed, more and more cybercriminals seek to attack backups to limit the possibilities for the victim to find his data …

Continue reading

error

Enjoy this blog? Please spread the word :)