Ransomware series: Exploring the tools & solutions that comprise a comprehensive ransomware strategy
Learn about the latest trends in attack techniques and leading-edge defensive countermeasures
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Driven by profit motive, technical developments, and law enforcement activity, ransomware actors are constantly evolving their techniques and methods.
Given that ransomware is such a wide-ranging problem, touching on end-user training, the entire security stack, and backup and disaster recovery solutions, no single tool could ever completely protect an organization.
But with the fast movement of attackers, even a carefully thought-out and comprehensive defense is quickly out of date.
Watch this Expert Series session with renowned ransomware defender Allan Liska to learn about the latest trends in attack techniques and leading-edge defensive countermeasures.
Allan will furnish you with the knowledge necessary to determine what elements of your array of defensive technologies might need to be updated or augmented.
Watch now
Provided by SentinelOne
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
What’s the role of IT operations management in improving infrastructure visibility?ITOM can map out hardware and software dependencies, bringing order to chaotic IT infrastructure
-
Why Google DeepMind’s AlphaGo breakthrough paved the way for the generative AI revolutionNews AlphaGo's victory over Go champion Lee Sedol in 2016 gave a "definitive preview of the AI era" and laid the groundwork for today's powerful tools.
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Using AI to generate passwords is a terrible idea, experts warnNews Researchers have warned the use of AI-generated passwords puts users and businesses at risk
-
Researchers called on LastPass, Dashlane, and Bitwarden to up defenses after severe flaws put 60 million users at risk – here’s how each company respondedNews Analysts at ETH Zurich called for cryptographic standard improvements after a host of password managers were found lacking
-
‘They are able to move fast now’: AI is expanding attack surfaces – and hackers are looking to reap the same rewards as enterprises with the technologyNews Potent new malware strains, faster attack times, and the rise of shadow AI are causing havoc
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
Notepad++ hackers remained undetected and pushed malicious updates for six months – here’s who’s responsible, how they did it, and how to check if you’ve been affectedNews Hackers remained undetected for months and distributed malicious updates to Notepad++ users after breaching the text editor software – here's how to check if you've been affected.
