Windows TCO: ClownStrike and Ransom
-
Silicon Angle ☛ The CrowdStrike bug and the risk of cascading failures
If a critical cyber incident against a single pipeline or shipping company can have pronounced supply chain implications, what would a cyber incident across multiple segments of the economy look like? The implications could be profound.
What’s more vexing is that this is not a new problem. SQL Slammer seized up an estimated one of every 1,000 computers worldwide more than 21 years ago. Unlike the CrowdStrike bug, on which the company was grilled before Congress last week, Slammer was an intentional exploit that had a patch available for over six months. Though there are certainly differences between the two events, software doesn’t care about intentions, motives or geopolitics.
-
Silicon Angle ☛ Identity-based attacks drive need for faster cybersecurity defenses
A key finding from CrowdStrike’s “2024 Threat Hunting Report” is the growing shift in how adversaries are targeting organizations. Attackers have moved away from traditional methods such as phishing emails containing malware-laden documents. Instead, they are increasingly focusing on identity-based attacks, which involve compromising legitimate credentials to infiltrate systems undetected, according to Meyers.
-
Silicon Angle ☛ Strengthening Cybersecurity with NDR and EDR integration
“It is a scary world we live in,” he stated. “When we survey through this report, the majority of the customers had 10 or more ransomware incidents in their network, in their infrastructure last year. 91% of customers had to pay ransomware. The coverage you get through endpoint detection solutions is about 50 to 60%. The remaining 40% is where we come in. We can give you complete visibility and the same level of protection for that remaining 30 to 40% of infrastructure that is out there.”