In 2022, a lot of new variants of ransomware and groups (Ransomware as a Service) have targeted several major organizations and enterprises. New techniques (new features introduced by the notorious “LockBit” group, and a newcomer, “Play” that employs self-propagation techniques) and groups emerged as targeted ransomware attacks double in 2022. Today’s organizations, no matter their …
Tag: Cybersecurity
Dec 07
Hackers love it when you post pictures of your work environment
Hackers love it when you post pictures of your work environment! We are all proud of what we are doing and proud of the great companies we are working in. But by taking pictures of your work environment for LinkedIn or your career blog you are unintentionally disclosing information about your technical setup. This is …
Nov 02
Defending Against Crypto-Ransomware with Netwrix
Hi, today we will discuss about data governance and more especially a software called: Netwrix Auditor. Netwrix Auditor is a visibility and governance platform that enables control over changes, configurations, and access in hybrid cloud IT environments to protect unstructured data regardless of its location. The platform provides security analytics to detect anomalies in user …
Mar 12
Office 365 MitM attack and Varonis protection
Last week, I had the opportunity to participate in a live session in French as official Speaker Varonis about Security, Data Protection & Governance as Varonis Elite member at SECURE IT DAY 2020 with Pierre-Antoine FAILLY (Security Architect – Varonis). We are seeing an uptick in adversaries using a very tricky Man-in-the-Middle (MitM) attack to …
Sep 18
Hardening VMware and Backup
Hi, availability is based on policy-based mechanisms where data is often manually relocated to optimize cost and performance or to recover from a security intrusion. Tomorrow’s availability must evolve to a more autonomous model where the system reacts and adjusts automatically to any significant changes in the behavior of data, apps, or users anywhere across …
- 1
- 2