Since the shocking announcement of serious Meltdown and Spectre vulnerabilities in early 2018, we have yet to hear of a mega-breach that would signal the start of another vicious hacking year. Has it been luck? Are our network security defenses stronger? Or are current hacks hiding their efforts? Whatever the situation, the expectations from lessons learned in historical security events are that hacking tools will evolve and new threat vectors will emerge — year after year.
Updated: 3/22/2018 It’s that time of the year again when we start to eagerly peruse the bracket for the CRN Channel Madness Tournament of Chiefs. You can vote for 32 excellent candidates, each with unique qualities that make them worthy of Channel Madness greatness. The competitors have been picked from four different camps: Infrastructure, Cloud, Hardware, and Security.
SonicWall announced today that Info Security Products Guide, the industry’s leading information security research and advisory guide, named the company Grand Trophy winners in their 2018 Info Security Product Guide Global Excellence Awards. SonicWall received a total of eight awards for ISPG’s 2018 awards program, including Gold in the CEO of the Year and Security Marketing Team of the Year categories.
Cyber security professionals exist in an increasingly complex world. As the cyber threat landscape evolves, a new cyber arms race has emerged that places organizations and their security solutions in the crosshairs of a growing global criminal industry. Cyber criminals are increasingly turning to highly effective advanced cyber weapons, such as ransomware, infostealers, IoT exploits and TLS/SSL encrypted attacks, to target organizations of all sizes around the world.
Make no mistake, we are in a global cyber arms race. But it can’t be won alone: we are in this together. That is why SonicWall is passing along findings, intelligence, analysis and research from our SonicWall Capture Labs to you today in our 2018 SonicWall Cyber Threat Report. By sharing actionable intelligence, we can help level the playing field against today’s most malicious cyber criminals.
Today CRN, a brand of The Channel Company, has named SonicWall to its annual Security 100 list. This project recognizes the coolest security vendors in each of five categories: Endpoint Security; Identity Management and Data Protection; Network Security; SIEM and Security Analytics; and Web, Email and Application Security. The companies on CRN’s Security 100 list have demonstrated creativity and innovation in product development as well as a strong commitment to delivering those offerings through a vibrant channel of solution providers.
The cyber security industry relies on perpetual cadence of collaboration, research, analysis and review. For SonicWall, that comes via our in-depth cyber threat report. This year, we’re excited to announce that we will publish the 2018 SonicWall Cyber Threat Report on Tuesday, March 6. This premier cyber security industry report puts you a step ahead of cyber criminals in the global cyber war, empowering you with proprietary security data, global knowledge and latest trends, gathered and analyzed by our leading-edge SonicWall Capture Labs Threat Network.
Cybercrime is a lucrative and booming industry, with recent reports estimating $600 billion in damages to businesses. With the introduction of innovative cyber security technologies and new cyber attack variants, the race is on for private and public organizations to arm themselves for a battle that is being waged in a dynamic threat landscape.
The demand for experienced cyber security professionals is at an all-time high. These highly skilled assets are essential in helping businesses protect customers, networks, sensitive data and intellectual property in a fast-moving cyber arms race. But according to a recent ESG study, 51 percent of respondents claimed their organization had a problematic shortage of cyber security skills.
One of the key characteristics of advanced malware is the use of many tactics to evade detection. In addition to defeating signature-based detection products and behavior-based detection tools, there are hundreds of evasion techniques advanced malware uses to avoid detection. Moreover, a malware object will typically deploy multiple tactics. While there are hundreds of specific tactics to evade detection, they fall into six key categories.