Cyber SecurityNews

Skybox provides Visibility against SamSam Ransomware in India

A recent report  claims that since its first appearance in December 2015, the SamSam ransomware has raked in almost $6 million by targeting organisations and individuals around the world, including those in India. According to the 47-page report by Sophos, 74 percent of the known victims are based in the United States. Other regions known to have suffered attacks include Canada, the U.K. and the Middle East, with India ranking sixth among the top victim countries across the world.

SamSam Ransomeware Is Not Like the Others, while the infection method of the SamSam ransomware is still unclear, as always, cyber hygiene practices should be the first line of defense. Preventing an attack (or being able to respond and isolate it quickly) requires a strong security foundation that is built on the complete visibility of the network. This pervasive visibility gives IT teams the ability to quickly identify potential exposures and attack paths.

Skybox gives you that visibility by consolidating data from more than 120 networking and security technologies organizations have in use. The Skybox SecuritySuite uses this information to create a dynamic model of an attack surface, including physical, multi-cloud and OT networks where needed. The model provides context around all of the ingress/egress points and complexities of your network and assets, giving you a detailed understanding of what you’re trying to defend.

  • After building the model of your environment, Skybox will conduct a risk analysis to identify and prioritize weaknesses and vulnerabilities such as unprotected ingress/egress points, misconfigured network devices, firewalls with overly permissive rules, exposed assets, exploitable attack vectors, etc.
  • Following the initial resilience assessment, the riskiest characteristics of the environment can be remediated to reduce risk quickly and in a demonstrable way
  • Acting on this insight, your environment will immediately be more secure and resilient. If an attack or malware outbreak does occur, you’ll have a greater context to contain the attack quickly and eliminate the attack vectors.

Related posts

Zendesk Comes Together with Smooch for Messaging Application

adminsmec

IT Spending in Securities Industry in India to reach $8.9B by 2017: Gartner

adminsmec

Citrix appoints Rahul Arora as Director – Cloud & Networking, India & SAARC

adminsmec