Persistence and Patience: Two Qualities You Don't Want Your Ransomware Attacker to Have
To help you stay ahead of the ever-evolving ransomware threat, I connected with Microsoft Chief Security Advisor, Sarah Armstrong-Smith.
How to Protect Your Data When Ransomware Strikes
A ransomware attack isn’t a single event; it’s persistent. To secure your organization, you need a full picture of what is happening with your endpoints, users, apps and data.
How to Protect Yourself from Supply Chain Attacks
To better understand these attacks, I invited Vodafone security experts Andy Deacon and Verity Carter-Johnson to the Lookout podcast.
Three Actions To Take Based on the Colonial Pipeline Ransomware Attack
Attackers launched a ransomware attack against the Colonial Pipeline that confirms how cybercriminals exploit reduced visibility, legacy security systems, and mobile devices.
Ransomware Attack Myths and How To Mitigate Risk
Learn how can protect your data from being held hostage from Microsoft Chief Security Advisor, Sarah Armstrong-Smith and Lookout Chief Strategy Officer, Aaron Cockerill.
Protect Enterprise Data in the Cloud From Ransomware
Ransomware is not a new threat, but attackers' tactics to access your infrastructures and steal resources have evolved. The scale of attacks has increased because of this.
Ransomware: A Cloudy Forecast
Ransomware is not a new threat, but attackers' tactics to access your infrastructures and steal resources have evolved.
Ransomware: A Cloudy Forecast (Swedish Edition)
Ransomware is not a new threat, but attackers' tactics to access your infrastructures and steal resources have evolved. IMPORTANT NOTE: The presenters speak in Swedish.
Half a Bitcoin To Get Your Data Back? How To Defeat Ransomware Attacks
The third episode in the Achieving Endpoint-to-Cloud Security series welcomes Magda Chelly, Head of Cyber Consulting, Former CISO, Founder of Women in Cybersecurity.