Year: 2020

5 Resources to Help Manage Your Businesses’ Cybersecurity During Uncertain Times

Over the past few years, the world of cybersecurity has changed dramatically.  The number of cyberattacks has greatly increased, with organizations of all sizes becoming targets. These attacks have resulted in billions of dollars lost, reputations destroyed, and even some companies having to close their doors for good.   Then, something even more unexpected happened.   Right 5 Resources to Help Manage Your Businesses’ Cybersecurity During Uncertain Times

Windows 7: The Dangers of Not Updating

Microsoft ended support for Windows 7 in January, which has implications for legacy users. So, unless you’re paying for the extended security updates, your Windows 7 devices are now more vulnerable to the growing number of cyberthreats. Ending the support lifecycle means Microsoft will no longer issue any software updates, including patches for newly discovered Windows 7: The Dangers of Not Updating

Arctic Wolf Agent for Linux: Extending Endpoint Visibility, Security Controls Benchmarking, and More

Having an increasingly mobile workforce combined with a greater number of employees working remotely means that companies need to manage a greater number of devices on their networks. Unfortunately, network detection by itself is no longer good enough. Endpoint visibility is therefore a critical requirement of securing the mobile workforce, especially as the attack surface Arctic Wolf Agent for Linux: Extending Endpoint Visibility, Security Controls Benchmarking, and More

Shifting to a Remote World. How Are You Maintaining Your Security Posture?

We realize Arctic Wolf isn’t the only organization currently adjusting to remote collaboration and  fine-tuning workflows across teams. With that in mind, we wanted to share a few security fundamentals that our teams are working through with our customers today.    Like other leaders we are working with, you’re likely thinking about the additional risks Shifting to a Remote World. How Are You Maintaining Your Security Posture?

MTTD and MTTR: Two Metrics to Improve Your Cybersecurity

For any organization to protect itself from cyberattacks and data breaches, it’s critical to discover and respond to cyber threats as quickly as possible. Shutting the window of vulnerabilities promptly makes the difference between a mild compromise and a catastrophic data breach. Understanding your ability to do so gives your organization a powerful way to MTTD and MTTR: Two Metrics to Improve Your Cybersecurity

The US Health and Human Services Department Suffers Cyberattack During COVID-19

As the world comes screeching to a standstill in an effort to minimize the impact of COVID-19, hackers and bad actors alike are chomping at the bit to exploit vulnerable systems in a vulnerable time. Everyone is a target, including federal government agencies. COVID-19 Cyberattacks On March 14, as our nation began to realize the The US Health and Human Services Department Suffers Cyberattack During COVID-19

Employees Working from Home? Why Cybersecurity Is More Important Than Ever

As the COVID-19 pandemic continues to develop, many employers are transitioning their teams to work from home. From a security perspective, organizations now face a double whammy. For starters, bad actors take advantage of major news events to conduct phishing campaigns. In times of uncertainty, cyber criminals don’t take time off, they see it as Employees Working from Home? Why Cybersecurity Is More Important Than Ever

Ransomware Reality

Ransomware won’t just disappear. Cybersecurity teams need strategies in place to combat its growing threat.

NedBank’s Data Breach Highlights the Importance of Vetting Your Vendors’ Security Protocols

Third-party vendors are a boon to many organizations who need to scale quickly. They offer specific expertise and help companies ramp up operational output. However, if third-party vendors lack proper cybersecurity measures, they can damage the reputation of your organization and do significant damage to your bottom line. The Dangers of a Data Breach Nedbank, NedBank’s Data Breach Highlights the Importance of Vetting Your Vendors’ Security Protocols

Arctic Wolf Lands $60M Series D

This new round of funding will allow Arctic Wolf to introduce new service offerings, address new markets and further cement a leadership position in the Managed Detection and Response (MDR) market.

Arctic Wolf Raises $60 Million to Further Fuel the Company’s Exponential Growth

New Round of Funding Will Ensure More Organizations Can Experience Personal, Predictable Protection SUNNYVALE, CA – March 11, 2020 – Arctic Wolf®, a leading security operations center (SOC)-as-a-service company, today announced it has raised $60 million in Series D funding, led by Blue Cloud Ventures and Stereo Capital, with additional participation from several new and Arctic Wolf Raises $60 Million to Further Fuel the Company’s Exponential Growth

The Top Cyberattacks of February 2020

  January showed that cyberattacks would ratchet up in 2020, just like they did the year before—and the year before that. What’s more, February provided further indication that this trend will continue well into the future.    The attacks vary in size and severity, but even smaller attacks can cause significant damages. It’s imperative that The Top Cyberattacks of February 2020

Le calculateur de retour sur investissement du SOC en tant que service

6 billions de dollars. Selon Cybersecurity Ventures, c’est ce que coûtera le cybercrime en 2021. Pour une entreprise, la solution peut sembler évidente : investir dans un SOC (Security Operations Center). Malheureusement, cela n’est tout simplement pas faisable pour la plupart des entreprises. Selon le rapport The Economics of Security Operations Centers du Ponemon Institute, une entreprise Le calculateur de retour sur investissement du SOC en tant que service

Key Takeaways From RSA 2020

Putting the “Human” in Human Element at RSA The theme of this year’s RSA conference was “Human Element.” This served as a refreshing change from last year’s show, where the messaging was dominated with the promise of machine learning and artificial intelligence saving the day. Fast forward to a year later, where the news continues Key Takeaways From RSA 2020

Les cinq vecteurs principaux de cyberattaque

Les principales cyberattaques de ces dernières années vont de la surveillance discrète par le logiciel espion Superfish à la perturbation directe par le rançongiciel WannaCry. Les cybercriminels affinent et actualisent constamment leurs tactiques, techniques et procédures (TTP), mais bon nombre des vecteurs d’attaque (chemins que les pirates informatiques empruntent) sont des thèmes récurrents dans les Les cinq vecteurs principaux de cyberattaque

L’incroyable décennie de la cybercriminalité

Le cybercrime s’est imposé comme un sujet bien trop commun dans l’actualité mondiale d’aujourd’hui. Comme on peut facilement l’imaginer, en plus de ses nombreux avantages, l’introduction des nouvelles technologies donne aux pirates l’occasion de mettre au point de nouvelles méthodes plus simples pour infiltrer les systèmes de données afin de voler des informations sensibles. Ce L’incroyable décennie de la cybercriminalité

Arctic Wolf Names Dan Larson as Senior Vice-President of Marketing

SUNNYVALE, CA – February 18, 2020 – Arctic Wolf®, a leading security operations center (SOC)-as-a-service company, today announced the addition of Dan Larson as Senior Vice-President of Marketing. In this new role, Larson will lead all aspects of Arctic Wolf’s marketing strategy including product marketing, demand generation, and field and partner marketing. Dan Larson brings more than Arctic Wolf Names Dan Larson as Senior Vice-President of Marketing

Will Briggs of Arctic Wolf Recognized on CRN’s 2020 Channel Chiefs List

SUNNYVALE, CA – February 14, 2020 – Arctic Wolf®, a leading security operations center (SOC)-as-a-service company, announced today that CRN®, a brand of The Channel Company, has named Will Briggs, Director of Channel Sales to its 2020 list of Channel Chiefs. This annual list recognizes the top vendor executives who continually demonstrate exemplary leadership, influence, Will Briggs of Arctic Wolf Recognized on CRN’s 2020 Channel Chiefs List

How FS-ISAC Threat Intelligence Ramps Up Financial Services Security

The legendary quote attributed to Willie Sutton still holds true: Why did Willie rob banks? Because that’s where the money is. In 2020, cybercriminals think no differently. Financial institutions house their clients’ money and today’s digital bad guys seek to make off with those riches. One important way Financial institutions manage to keep ahead of How FS-ISAC Threat Intelligence Ramps Up Financial Services Security

Defending Against the CIS Critical Security Controls

Inside of every businesses’ core infrastructure lies routers, switches, firewalls, active directory services, email servers, etc., all of which are shipped out-of-the box with default configuration settings built for speed and ease of deployment. But not for security.   Over time, these configurations start to drift due to poor workflows, processes, lack of monitoring, employee turnover, Defending Against the CIS Critical Security Controls

The Top Cyberattacks of January 2020

Already in the new year we’ve seen a surge in news about cybersecurity breaches worldwide. Cyberattacks continue without pause from where 2019 left off.   The latest round of data breaches are further proof that strong security has become an absolute necessity for institutions across all sectors. These breaches reveal that no business is spared The Top Cyberattacks of January 2020

The Top 10 Cyber Attacks Threatening Your Organization

IT staffs everywhere are struggling to protect ever-increasing attack surfaces from a growing number of attack types—making cybersecurity feel complicated and overwhelming. While the number of specific bugs, viruses, bots, and exploits is seemingly beyond measure, they often fall within the same handful of attack types. By learning these types, you can begin to create The Top 10 Cyber Attacks Threatening Your Organization

What is a Zero Day Exploit? How to Defend Against Them

While the best protective measures can’t protect your business completely from a zero-day attack, many of the same cybersecurity best practices are useful for protecting against zero-day exploits.  To protect your home from thieves, the easiest thing you can do is lock your windows and doors every time you leave the house. Similarly, in cybersecurity, What is a Zero Day Exploit? How to Defend Against Them

7 of the Largest Data Breaches of 2019

2018 was the most devastating year ever for cyber attacks…until 2019.  For 365 days, it was an all-out-assault of data breaches. Hundreds of millions of people had their personal data stolen. Billions of dollars were lost. Businesses of every size were left defenseless. The danger spread across virtually every industry. Financial. Medical. Legal. Popular consumer 7 of the Largest Data Breaches of 2019

Arctic Wolf Named as a Representative Vendor in Gartner Market Guide for Endpoint Detection and Response Solutions

SUNNYVALE, CA – January 10, 2020 – Arctic Wolf Networks, a leading security operations center (SOC)-as-a-service company, today announced its inclusion as a Representative Vendor in the 2019 edition of Gartner’s Market Guide for Endpoint Detection and Response Solutions[1] (Gartner subscription required). According to Gartner, “The speed of detection and response are critical, and many Arctic Wolf Named as a Representative Vendor in Gartner Market Guide for Endpoint Detection and Response Solutions