0

The evolving landscape of ransomware: Analyst panel examines cybersecurity challenges and solutions | #ransomware | #cybercrime

[ad_1]

With the increased threat of cyberattacks and ransomware, cybersecurity has become more than just a buzzword but a matter of great importance for organizations worldwide.

The threat of ransomware, in particular, has taken center stage, evolving from mere data encryption to a sophisticated and lucrative criminal enterprise. In the ever-shifting frontier of cybersecurity, the stakes have never been higher, and the need for comprehensive solutions has never been more urgent.

“People are struggling today to even protect their mission-critical applications against ransomware,” said Christophe Bertrand (pictured, second from right), practice director of data management and analytics at Enterprise Strategy Group. “The biggest issue is recoverability in a timely fashion. You can only do that if you’ve really thought through all of the possibilities and have all the right technologies in place.”

Bertrand was joined by Zeus Kerravala (right), founder and principal analyst at ZK Research; and Rob Strechay (second from left), managing director and lead analyst for SiliconANGLE and theCUBE, as they talked with theCUBE co-founder and industry analyst Dave Vellante (left) as part of an analyst panel at the Cyber Resiliency Summit, during an exclusive broadcast on theCUBE, SiliconANGLE Media’s livestreaming studio. They discussed the world of ransomware, the challenges encountered and the complex web of data protection strategies that organizations must navigate to safeguard their viability in an increasingly perilous digital landscape. (* Disclosure below.)

Ransomware’s alarming evolution

Ransomware has come a long way from its early days of simply encrypting data and extorting victims for a decryption key. One area that ransomware attacks have evolved is in the area of data exfiltration, according to Bertrand. Attackers are no longer content with just locking data; they now steal sensitive information, such as HR records, for monetary gain and reputation damage. This evolution has made ransomware attacks even more sophisticated and dangerous.

“I think the key is about the first line of defense … having that plan that really integrates the people, the processes and the technology,” Bertrand said. “Whether you’re talking about security, posture management … by the time the cyber guys call the backup guys, it’s kind of too late, so you never want to be in that position.”

The shift toward remote work and other technological trends has expanded the attack surface, providing cybercriminals with more opportunities to infiltrate systems. The slow, methodical approach they employ makes it challenging to detect and prevent these attacks. Moreover, the types of data that attackers target have also changed, emphasizing the importance of protecting not just data, but the entire ecosystem.

“This is the problem with security, we have too many tools,” Kerravala said. “Every time there’s a new threat, we roll on another tool … you don’t have consistency across them.”

Data protection strategies in a complex cybersecurity ecosystem

The complexity of the cybersecurity landscape was also a topic of discussion. With numerous security tools and technologies available, organizations often struggle to manage them effectively. Silos of information and policies create inconsistencies, making it challenging to respond cohesively to threats.

“I still have to go to where the data lives, and I still need to protect the data, air gap as we’ve been talking about,” Strechay said. “I think that’s part of it … the attacks have gotten so sophisticated. You’ve got to look at, do you have the processes?”

This integration should extend beyond cybersecurity alone. It is crucial to have a comprehensive plan, with testing and recovery being paramount. Organizations should adopt a resilient cyber strategy rather than focusing solely on backup and recovery, according to Bertrand.

Companies should also seek to partner with ecosystem integration experts, leverage APIs and collaborate with various vendors to create a robust defense against ransomware attacks. The emphasis is shifting from best-of-breed solutions to an integrated, holistic approach that prioritizes the ability to respond effectively to threats, according to Kerravala.

“It’s one of those things where it’s like buying life insurance,” he said. “You don’t really think about it until you get hit. And it’s a thing that might happen but might not happen. This is where I think this has to be considered part of critical infrastructure for all companies. I don’t think a lot of business leaders think of it that way.”

Here’s the complete video interview, part of SiliconANGLE’s and theCUBE’s coverage of the Cyber Resiliency Summit:

(* Disclosure: TheCUBE is a paid media partner for the “Cyber Resiliency Summit.” Neither Dell Technologies Inc., the sponsor of theCUBE’s event coverage, nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)

Photo: SiliconANGLE

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU

[ad_2]

Source link

National Cyber Security

FREE
VIEW