Category: VMware Carbon Black

Securing Containers and Kubernetes-Orchestrated Environments

Read the original article: Securing Containers and Kubernetes-Orchestrated Environments In a recent Black Hat webcast, “Securing Containers and Kubernetes-Orchestrated Environments,” sponsored by VMware Carbon Black, guest speakers Sheila A. Berta, Offensive Security Specialist, Dreamlab Technologies and Haim Helman, CTO, VMware…

2021 Cybersecurity Outlook: Attackers vs. Defenders

Read the original article: 2021 Cybersecurity Outlook: Attackers vs. Defenders COVID-19, One Year Later 2020 was undoubtedly a defining year for cybersecurity – a year that ended with the SolarWinds breach, which infiltrated US government agencies and organizations at a…

2021 Cybersecurity Outlook: Attackers vs. Defenders

Read the original article: 2021 Cybersecurity Outlook: Attackers vs. Defenders COVID-19, One Year Later 2020 was undoubtedly a defining year for cybersecurity – a year that ended with the SolarWinds breach, which infiltrated US government agencies and organizations at a…

Women in Security: Celebrating Women’s History Month

Read the original article: Women in Security: Celebrating Women’s History Month In celebration of Women’s History Month, we are honoring all of the women at VMware who inspire, lead, innovate and set the stage for the next generation to come.…

Deploying The New VMware Carbon Black Container Security Solution

Read the original article: Deploying The New VMware Carbon Black Container Security Solution “VMware acquired Octarine, a privately held company in Sunnyvale, California on May 27, 2020. Octarine offers a cloud-native security platform for the complete lifecycle of applications running…

VMware Carbon Black Champions Data Privacy Day 2021

Read the original article: VMware Carbon Black Champions Data Privacy Day 2021 Today is Data Privacy Day, an annual effort hosted by the National Cybersecurity Alliance (NCSA) to raise awareness about the importance of privacy and protection of personal information.…

VMware Carbon Black Cloud™ Awarded Cyber Catalyst Designation

Read the original article: VMware Carbon Black Cloud™ Awarded Cyber Catalyst Designation VMware Carbon Black Cloud has been awarded a Cyber CatalystSM designation for its cloud native endpoint and workload protection platforms, which helps more than 20,000 organizations worldwide detect…

A Look Ahead: 9 Cybersecurity Predictions for 2021

Read the original article: A Look Ahead: 9 Cybersecurity Predictions for 2021 Following an unprecedented year, what’s to come for cybersecurity in 2021? The ripple effects of the global pandemic have created a new threat landscape. In March, 90% of…

VMware Carbon Black Cloud Adds Device Control

Read the original article: VMware Carbon Black Cloud Adds Device Control With most organizations now working remotely, the chances your employees may unintentionally use restricted devices and infect your network has grown exponentially. With this threat in mind, we’re happy…

Defining Cloud Workload Protection

Read the original article: Defining Cloud Workload Protection Organizations are now turning to an increasingly hybrid cloud infrastructure model to support remote workforces, a trend that has accelerated significantly amid the recent global health crisis. This presents a new challenge…

Risk Score 101: What to look for in a Risk Score

Read the original article: Risk Score 101: What to look for in a Risk Score (Editor’s Note: Monica White, a guest author on the Carbon Black blog, is the Director of Product Marketing at Kenna Security) When we at Kenna…

Querying Windows Event Logs for Faster Investigation and Response

Read the original article: Querying Windows Event Logs for Faster Investigation and Response With this week’s release on the VMware Carbon Black Cloud, users can now remotely inspect Windows devices’ event logs to pull back information that could be helpful during an investigation or response scenario. This new capability…

Cybersecurity Awareness Month: 2020 in Retrospect

Read the original article: Cybersecurity Awareness Month: 2020 in Retrospect The post Cybersecurity Awareness Month: 2020 in Retrospect appeared first on VMware Carbon Black.   Become a supporter of IT Security News and help us remove the ads. Read the…

Cybersecurity Awareness Checklist

Read the original article: Cybersecurity Awareness Checklist Cybersecurity Awareness Month (CAM 2020), in its 17th year, is an annual campaign in October that raises awareness on the importance of cybersecurity. This year’s theme is “Do Your Part. #BeCyberSmart” along with…

Cybersecurity Awareness Checklist

Read the original article: Cybersecurity Awareness Checklist Cybersecurity Awareness Month (CAM 2020), in its 17th year, is an annual campaign in October that raises awareness on the importance of cybersecurity. This year’s theme is “Do Your Part. #BeCyberSmart” along with…

Crossing the Narrow Sea

Read the original article: Crossing the Narrow Sea Tom Kellermann, Head of Cybersecurity Strategy at VMware and Member of the Cyber Investigations Advisory Board of the United States Secret Service. “The Greatest trick the devil ever pulled was to convince…

Intrinsic Security at VMworld 2020

Read the original article: Intrinsic Security at VMworld 2020 VMworld 2020 kicked off today and for the first time ever, hundreds of security experts took the virtual stage to unveil how organizations can build a future read business with a truly unified security approach.…

Introducing VMware Carbon Black Cloud Workload™

Read the original article: Introducing VMware Carbon Black Cloud Workload™ If you know Carbon Black, you know that we helped invent Endpoint Detection and Response (EDR) and pioneered the field of next-generation anti-virus (NGAV) and malware protection. If you know…

The ABCs of Digital Distancing

Read the original article: The ABCs of Digital Distancing What is digital distancing? Like social distancing, digital distancing is the practice of isolating user access to networks, apps, and workloads to reduce the spread of malicious activity, and more effectively…

Top Three Demos at VMworld 2020: Security, Threat Hunting, and Beyond

Read the original article: Top Three Demos at VMworld 2020: Security, Threat Hunting, and Beyond VMworld 2020 (Sept. 29- Oct. 1) is fast approaching. This year, and for the first time ever, VMworld will showcase a new intrinsic security track featuring 50+ sessions on the future of workspace and workload security. Attendees will…

XDR Defined

Read the original article: XDR Defined The EDR market is going through the biggest period of change and innovative now. Historically, endpoint detection and response (EDR) was created to provide borderline protection for a system. It provides coverage for endpoints in an attack, and the…

The Future of Security: Lessons from Black Hat USA

Read the original article: The Future of Security: Lessons from Black Hat USA The post The Future of Security: Lessons from Black Hat USA appeared first on VMware Carbon Black.   Advertise on IT Security News. Read the original article:…

The Future of Security: Lessons from Black Hat USA

Read the original article: The Future of Security: Lessons from Black Hat USA The post The Future of Security: Lessons from Black Hat USA appeared first on VMware Carbon Black.   Advertise on IT Security News. Read the original article:…

Freedom, Flexibility, and Security: The Future of Remote Work

Read the original article: Freedom, Flexibility, and Security: The Future of Remote Work Over the past few months, many digital heavy enterprises have optimized (or transformed) their operations to bolster business continuity and resilience. One of these changes is implementing…

TAU Threat Discovery: Cryptocurrency Clipper Malware Evolves

Read the original article: TAU Threat Discovery: Cryptocurrency Clipper Malware Evolves Clipper malware is designed to steal cryptocurrency from victims by replacing wallet addresses in the victim’s clipboard with wallet addresses that belong to the attacker. This stealthy technique is…

Fact vs. Fiction: 10 Endpoint Security Myths Debunked

Read the original article: Fact vs. Fiction: 10 Endpoint Security Myths Debunked Simply defined, endpoint security protects desktops, laptops, servers, and fixed-function devices from malicious internal and external threats. Endpoint security combines various threat detection, response and prevention technologies to help organizations disrupt cyberattacks. Despite the clear-cut definition, there’s still some confusion…

TAU Threat Discovery: Conti Ransomware

Read the original article: TAU Threat Discovery: Conti Ransomware Conti is a new family of ransomware observed in the wild by the Carbon Black Threat Analysis Unit (TAU). Unlike most ransomware, Conti contains  unique features that separate it in terms of performance and focus…

TAU Threat Discovery: Conti Ransomware

Read the original article: TAU Threat Discovery: Conti Ransomware Conti is a new family of ransomware observed in the wild by the Carbon Black Threat Analysis Unit (TAU). Unlike most ransomware, Conti contains  unique features that separate it in terms of performance and focus…

6 Best Practices to Fight a New Breed of Insider Threats

Read the original article: 6 Best Practices to Fight a New Breed of Insider Threats The current global pandemic has disrupted how organizations work. Some businesses quickly adapt while other organizations are still figuring out the new landscape. Unfortunately, criminals are exploiting…

TAU Threat Analysis: Bundlore (macOS) mm-install-macos

Read the original article: TAU Threat Analysis: Bundlore (macOS) mm-install-macos The mm-install-macos variant of the Bundlore family of macOS adware has been around for many years in many variations and delivery methods. Recently, a variant with a novel installation method was discovered. Although…

Popular Techniques Used by Cybercriminals Amid COVID-19

Read the original article: Popular Techniques Used by Cybercriminals Amid COVID-19 (Editor’s Note: Gary Stevens, a technology writer, is posting as a guest author to carbonblack.com). Cybercriminals constantly leverage fear and confusion by launching cyberattacks during major world events. Such attacks are…

Popular Techniques Used by Cybercriminals Amid COVID-19

Read the original article: Popular Techniques Used by Cybercriminals Amid COVID-19 (Editor’s Note: Gary Stevens, a technology writer, is posting as a guest author to carbonblack.com). Cybercriminals constantly leverage fear and confusion by launching cyberattacks during major world events. Such attacks are…

TAU Threat Analysis: Relations to Hakbit Ransomware

Read the original article: TAU Threat Analysis: Relations to Hakbit Ransomware (See part one of TAU’s Hakbit Ransomware analysis here.) Many blue team defenders out there will attest to the fact that ransomware is on the rise, and that ransomware doesn’t appear…

TAU Threat Analysis: Relations to Hakbit Ransomware

Read the original article: TAU Threat Analysis: Relations to Hakbit Ransomware (See part one of TAU’s Hakbit Ransomware analysis here.) Many blue team defenders out there will attest to the fact that ransomware is on the rise, and that ransomware doesn’t appear…

TAU Threat Analysis: Hakbit Ransomware

Read the original article: TAU Threat Analysis: Hakbit Ransomware The bad actor(s) behind Hakbit ransomware recently released an updated variant of their ransomware, which encrypts the victim’s data and demands 3 Bitcoins in ransom payment. This updated variant is delivered via phishing email…

TAU Threat Analysis: Hakbit Ransomware

Read the original article: TAU Threat Analysis: Hakbit Ransomware The bad actor(s) behind Hakbit ransomware recently released an updated variant of their ransomware, which encrypts the victim’s data and demands 3 Bitcoins in ransom payment. This updated variant is delivered via phishing email…

Why SecOps is (Still) the Future

Read the original article: Why SecOps is (Still) the Future (**Editor’s Note: **Sam Bocetta, a guest author on the VMware Carbon Black blog, is a freelance journalist specializing in U.S. diplomacy and national security, with emphases on technology trends in cyber…

TAU Threat Analysis: Medusa Locker Ransomware

Read the original article: TAU Threat Analysis: Medusa Locker Ransomware In recent weeks Carbon Black’s Threat Analysis Unit (TAU) has seen an increase in the number of infections attributed to the Medusa Locker ransomware family. There were notable traits exhibited…

TAU Threat Analyis: Medusa Locker Ransomware

Read the original article: TAU Threat Analyis: Medusa Locker Ransomware In recent weeks Carbon Black’s Threat Analysis Unit (TAU) has seen an increase in the number of infections attributed to the Medusa Locker ransomware family. There were notable traits exhibited…

Bringing Intrinsic Security to Containers: VMware Acquires Octarine

Read the original article: Bringing Intrinsic Security to Containers: VMware Acquires Octarine UPDATE: On May 27, 2020 VMware officially closed its acquisition of Octarine. The blog post below has been amended to reflect that announcement.   _______________________    Today is a very exciting day for VMware and…

Forrester Study: VMware Carbon Black Cloud Provides 379% ROI

Read the original article: Forrester Study: VMware Carbon Black Cloud Provides 379% ROI A newly published Forrester Consulting Total Economic Impact™ (TEI) study shows that organizations who replace their legacy endpoint security products with the VMware Carbon Black Cloud experience…

Bringing Intrinsic Security to Containers: VMware Acquires Octarine

Read the original article: Bringing Intrinsic Security to Containers: VMware Acquires Octarine UPDATE: On May 27, 2020 VMware officially closed its acquisition of Octarine. The blog post below has been amended to reflect that announcement.   _______________________    Today is a very exciting day for VMware and…

Forrester Study: VMware Carbon Black Cloud Provides 379% ROI

Read the original article: Forrester Study: VMware Carbon Black Cloud Provides 379% ROI A newly published Forrester Consulting Total Economic Impact™ (TEI) study shows that organizations who replace their legacy endpoint security products with the VMware Carbon Black Cloud experience…