InSecurity Podcast: The Cylance Threat Report – 2017 Year in Review

According to the newly released The Cylance Threat Report: 2017 Year in Review, ransomware attacks grew threefold during 2017, affecting all verticals but impacting healthcare the most, and the top two infection vectors remained email and drive-by downloads.

The report also found that system damage and data destruction represented top risks from threats executing within an enterprise environment.

In this episode of the InSecurity Podcast, host Matt Stephenson is joined by special guests Aditya Kapoor – Head of Security Research and Innovation, Jim Walter – Senior Security Researcher, and Steve Salinas – Senior Product Marketing Manager – to discuss some of the most salient outcomes of the report.


Download the full Threat Report HERE

Aditya Kapoor is Head of Security Research and Innovation at Cylance. He joined Cylance three years ago as and is passionate about creating technologies that drive innovative features within products. He is currently focused on driving deeper program analysis for supercharging ML models, firmware security and analyzing current threat trends to drive innovative engineering solutions.

Aditya speaks regularly at various conferences and firmly believes in the common cause of the security industry. Previously Aditya worked at McAfee/Intel for more than ten years as Research Architect where he reverse engineered malware, as well as designed several product technologies.

Jim Walter is a Senior Security Researcher with Cylance. He focuses on next-level attacks, actors, and campaigns as well as ‘underground’ markets and associated criminal activity. 

Jim is a regular speaker at cybersecurity events and has authored numerous articles, whitepapers and blogs specific to advanced/low-level threats. He joined Cylance following 17 years at McAfee/Intel Security running their Advanced Threat Research and Threat Intelligence teams and content streams.

Steve Salinas is the Senior Product Marketing Manager for the security products at Cylance. He has been defining and (Read more...)

*** This is a Security Bloggers Network syndicated blog from Cylance Blog authored by Cylance Podcasts. Read the original post at: