How do you detect a security breach inside your network? How do you collect the necessary intelligence to protect your assets properly? Sun Tzu, author of The Art of War, said that convincing your opponents to unveil their identity without knowing that they are being watched is one of the most important keys to winning a war. Attack deception is one of the best techniques to make attackers unveil their identity and gain valuable intelligence. While it is not new, advanced attack deception methods take advantage of Sun Tzu’s strategy.
Opportunistic hackers are far from the limelight these days but they still exist and can cause large amounts of damage if they manage to break into your systems. We’ve recently observed our Data Center Security Suite catch such a hacker, an “Alex” from Romania who has kindly enough supplied his own name and private domain for publicity.
So, VMworld Europe just concluded last week and certainly there was a lot to talk about, from hybrid clouds, VMware’s acquisition of Boxer, Dell’s acquisition of EMC and how this affects VMware (it doesn’t according to Dell CEO Michael Dell), VMware CEO Pat Gelsinger’s keynote where he highlighted the five imperatives of the digital business and also called out of some enterprises for lack of agility (“Elephants must learn to dance”) and of course, security, which seemed to be integrated into almost every topic at the event.
Today we announced the general availability of the GuardiCore Data Center Security suite.
We are very excited to bring our solution to market, and feel we will be able to provide much needed help for organizations that are struggling to withstand the onslaught of cyber attacks.
Last week our team, myself included, participated in the CloudStack Collaboration Conference ( CSCC) that took place in Dublin, Ireland. About 200 attendees enjoyed a well-organized event during a non-typical Irish weather (sunny, no rain).
As a bonus, the local team won the UEFA EURO soccer match against the strong German team.
In the first part of our blog about ransomware, we reviewed its history and examined how ransomware had advanced technologically over time. In this post we would like to discuss the future of this cyber attack and suggest that it will increasingly target corporate data centers with APT-based campaigns.
We are very excited about the upcoming VMWorld Show and the opportunity to showcase our GuardiCore Data Center Security Suite.
The event brings together the greatest technology experts in virtualization and data centers, and it is a great opportunity for us to engage in a deep discussion with people who run Software-Defined Data Centers and hear first-hand about the security measures deployed across their data centers and clouds.
Some of the most infamous cyber security breaches to US Federal systems in recent years were caused via a previous breach to a contractor’s system. Some of the most notable cases were the Office of Personnel Management (OPM) breach where officials said that the thieves broke in by using stolen contractor logins and passwords and the Lockheed hack.
Gartner finds deception an attractive new capability for larger organizations desiring advanced threat detection and defense solutions. According to Gartner, new deception techniques and capabilities “promise to deliver game-changing impact on how threats are faced.”
For us at GuardiCore, this is not surprising. During the past months we have been working closely with our customers and witnessed how the GuardiCore solution is “changing the game” with automated, real-time threat detection and response inside datacenters and clouds. Read more
This is the first in a series of posts about ransomware, dealing with ransomware history, technological developments and GuardiCore forecast for future trends.
Ransomware is malware that infects your computer systems and restricts access to it, until a ransom is paid. Once your computer is infected, the malware hijacks your files, locks them up with virtually unbreakable encryption and demands a ransom of up to $2000 in Bitcoins to unscramble them. Read more