SBN

Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 7/7

Insight #1

When responding to a ransomware attack, recognize that most ransomware will deploy a remote-access Trojan (RAT).  If you do not identify and terminate the RAT, the attackers will return.
 

Insight #2

If you conduct pen tests, remember that you need to have ground truth per your applications. That ground truth can only be garnered by running
Interactive Application Security Testing (IAST)

 

Insight #3

As evidenced by the
Cyber Bank Heists
report, cybercriminals are stealing non-public market information.  Don’t assume they merely want to extort you or steal money. If you are publicly traded, they want your strategy.  

 

Insight #4

Shoxing is real. Cybercriminals will conduct an intrusion, short your stock and then dox you.  Stop the Shox. 

Learn More

Claroty

*** This is a Security Bloggers Network syndicated blog from AppSec Observer authored by Tom Kellermann, SVP Cyber Strategy, Contrast Security. Read the original post at: https://www.contrastsecurity.com/security-influencers/cybersecurity-insights-with-contrast-svp-of-cyber-strategy-tom-kellermann-7/7

Application Security Check Up