Blog

Posts by Phil Richards

Why Asset Management Is the Most Important Security Control

The first five controls in the CIS Top 20 identify two controls relating to asset management. Numbers one and two talk about managing hardware and software assets. The question comes up pretty frequently: Why would managing assets be the single most important thing a company can do to improve securi…

Read more...

Global Ransomware Attack Based on a Petya Variant Threatens Repeat of WannaCry

UPDATE: June 27, 2017 — Chris Goettl Petya Ransomware Attack: What Should Companies Be Doing Right Now? Several critical vulnerabilities with known exploits or proof-of-concept code should be the focus of everyone’s attention. The SMB exploits (EternalBlue and its siblings) resolved in Microsoft’s M…

Read more...

Ransomware: Should You Pay the Ransom?

Security professionals dread the day when they get the call that ransomware has infiltrated their network and has already started encrypting files, drives and network shares. After the initial shock has worn off and the ransomware is no longer encrypting new files, the decision quickly turns to whet…

Read more...

Why We Partner (Hint: So You Can Benefit)

Endpoint protection has evolved substantially over the past few years. At one time an endpoint protection platform was defined as antivirus software and a centralized console for keeping AV rules and definitions up to date. Now, even the oldest antivirus companies recognize that traditional antiviru…

Read more...