Considering Change Management? Consider FireMon

| | Uncategorized
Save time and resources while eliminating the risks caused by misconfigurations   Good policy hygiene relegates access to only what is necessary to meet the needs of the business: nothing more and nothing less. As discussed in a recent blog, poor policy hygiene creates vulnerable paths the bad actors can ... Read More

How to Select a Change Management Solution

| | Uncategorized
The most common threat to business security is accidental firewall and cloud security group misconfigurations. Manual rule and policy management of complex ground-to-cloud networks introduces countless opportunities for error, and most breaches are attackers taking advantage of this low-hanging fruit. Time-consuming manual changes, fragmented ownership, and policy clutter all contribute ... Read More

Prevent Ransomware with Proper Policy Hygiene

| | Uncategorized
Ransomware attacks typically begin with phishing, credential hacks, or taking advantage of open vulnerabilities. Once the bad actor is in, they rummage around looking for access to their honeypot, a hub of data, to hold hostage. Maintaining good policy hygiene and access control is paramount in preventing and stopping the ... Read More

Ransomware is in the Cloud

| | Uncategorized
Visibility, monitoring, and collaboration are the keys to identifying and preventing ransomware from breaching your infrastructure.   In a world of rapid digital transformation, ransomware ranks among the top concerns for cyber security professionals, and with good reason. It is elusive and can pawn even the most secure of organizations ... Read More
😊

Goodbye “Kill Chains”, Hello “Attack Sequences”

| | Uncategorized
A few years ago at the RSA Conference I co-presented on the top cloud attack “kill chains”. Shawn Harris @infotechwarrior and I walked through what we considered to be the top 10+ real world cloud attacks. For each attack, we walked through each step, and some attacks had multiple branches ... Read More
What You Need to Know About Ransomware in AWS

What You Need to Know About Ransomware in AWS

| | Uncategorized
by Rich Mogull As bad of an issue ransomware is within data centers, I was a bit skeptical that it was much of a problem in cloud. I, personally, hadn’t run into any incidents and I started to think it was more theoretical than anything else. It turns out, I ... Read More

Ransomware Attacks – The new normal?

| | Guest Blogs
Once again, the world is hit with another ransomware attack. Similar to the WannaCry Ransomware cyberattack last month, Petya is causing major pain among thousands of users, this time crippling banks and infrastructure in what cybersecurity experts called one of the most-devastating digital intrusions of its type. In fact, not ... Read More
Five Tips to Ensure Consistent Security Hygiene

Five Tips to Ensure Consistent Security Hygiene

| | Guest Blogs
Security’s focus has always been on protecting against complicated, advanced attacks. The battle between advanced attackers and awesome defenders makes for a great story. You know, good vs. evil. Many of you have likely been preparing for a cyber-attack from Russia, given their war with Ukraine. The US Government has ... Read More
Matt Eberhart

Cloud Security Pioneer Rich Mogull Joins FireMon Team

| | FireMon News
              It’s been seven months since DisruptOps joined FireMon with a mission to improve security outcomes by improving security operations. I’m excited to announce that DisruptOp co-founder Rich Mogull is joining us as SVP Cloud Security to continue pioneering the future of cloud security ... Read More