Cybersecurity Insights with Contrast SVP of Cyber Strategy Tom Kellermann | 7/7
Insight #1
When responding to a ransomware attack, recognize that most ransomware will deploy a remote-access Trojan (RAT). If you do not identify and terminate the RAT, the attackers will return.
Insight #2
If you conduct pen tests, remember that you need to have ground truth per your applications. That ground truth can only be garnered by running
Interactive Application Security Testing (IAST)
.
Interactive Application Security Testing (IAST)
.
Insight #3
As evidenced by the
Cyber Bank Heists
report, cybercriminals are stealing non-public market information. Don’t assume they merely want to extort you or steal money. If you are publicly traded, they want your strategy.
Insight #4
Shoxing is real. Cybercriminals will conduct an intrusion, short your stock and then dox you. Stop the Shox.
Learn More
*** This is a Security Bloggers Network syndicated blog from AppSec Observer authored by Tom Kellermann, SVP Cyber Strategy, Contrast Security. Read the original post at: https://www.contrastsecurity.com/security-influencers/cybersecurity-insights-with-contrast-svp-of-cyber-strategy-tom-kellermann-7/7