Ransomware Negotiation Scenarios: What to Expect Threat Researcher

We wanted to get a better understanding of what victims go through during the aftermath and recovery process of a ransomware attack to help others in case they find themselves in a similar situation. To do this, we analyzed victim support chats for five ransomware families. Read More HERE…

Read more

Ransomware Negotiation Scenarios: What to Expect

We wanted to get a better understanding of what victims go through during the aftermath and recovery process of a ransomware attack to help others in case they find themselves in a similar situation. To do this, we analyzed victim support chats for five ransomware families. Read More HERE…

Read more

What Is Zero Trust and Why Does It Matter?

There has been a lot of discussion around Zero Trust recently—is it a solution? A strategy? A pipe dream? Eric Skinner from Trend Micro gets real about Zero Trust and explains what it really is, and how organizations can use it to be more resilient. Read More HERE…

Read more

Protecting Against Recent Ransomware Attacks

Modern ransomware attacks targeting large enterprises continue to evolve from double to triple or even quadruple extortion tactics. Discover how to stay one step ahead with our case study of the ransomware family, Nefilim. Read More HERE…

Read more

The Importance of Being the Leader in Public Vulnerability Research

You can’t stop what you don’t know about. See how our leadership in vulnerability disclosures can protect you faster. Read More HERE…

Read more