Tag Archive for: event

3 insights you might have missed from the VeeamON event


After two years holding online-only events, the recent VeeamON 2022 event saw the launch of the first hybrid VeeamON. While the in-person crowd gathered in Las Vegas to celebrate the lifting of pandemic restrictions with live sessions and corridor chats, close to 40,000 additional attendees took part in a parallel virtual event that included live keynote speeches and content from Las Vegas alongside exclusively online sessions.

It was also the first VeeamON appearance for Veeam Software Corp. Chief Executive Officer Anand Eswaran (pictured), who outlined big goals for the future of the company. Data protection is a crowded market, with Gartner’s Magic Quadrant showing newer entrants, such as Cohesity Inc. and Rubrick Inc., joining Veeam, Dell Technologies Inc., CommVault Systems Inc. and Veritas Technologies LLC, in the leaders’ quadrant. 2021 marked Veeam’s fifth year in the top position.

But, the big news was that IDC Corp. data had Veeam and Dell neck-and-neck for market share. It’s not a position Eswaran plans to stay in for long.

“We see a path to taking share and getting from here, 12% [of market share], to 25% to 40% and being an outsize number one,” Eswaran told theCUBE industry analysts Dave Vellante and David Nicholson in an interview at VeeamON, during an exclusive broadcast on theCUBE, SiliconANGLE Media’s livestreaming studio. (* Disclosure below.)

In case you missed VeeamON, here are theCUBE’s top three takeaways from the event:

1) Cybercriminals target backup first.

There’s an old information technology joke: “We’re the best at backup … but terrible at recovery.” It used to be funny, but with known zero-day exploits being stockpiled by criminals, it is inevitable that companies are going to get hit with a ransomware attack — that is, if they haven’t already been unknowingly infiltrated.

Seventy-six percent of organizations reported an attack in 2021, according to research in the “2022 Top Trends in Data Protection” report published by Veeam. Of the data targeted, only 47% was encrypted and only 64% of that was recoverable.

“Ninety-four percent of the time, one of the first intrusions is to attempt to get rid of…

Source…

Ohio County ‘Shocked’ After Mike Lindell Event Shares Its Computers’ Data, Spurs FBI Probe


An Ohio county was “shocked” after screen shots from its computer system were shared at MyPillow founder Mike Lindell‘s cyber symposium in August to promote baseless claims of election fraud.

Lindell has been a key promoter of former President Donald Trump‘s unfounded conspiracy theory that the 2020 election was “rigged” or “stolen” in favor of President Joe Biden. Although Lindell and others continue to spread the misinformation, the “evidence” they have brought forward to support their theory has been consistently discredited and debunked.

During an August cyber symposium organized by Lindell, screen shots from a Lake County computer system not involved in conducting elections were shared as alleged “evidence” of election fraud, The Washington Post first reported on Friday.

Lake County official quickly began looking into the issue, confused by how and why the information was used in Lindell’s event.

“We were shocked that sleepy little Lake County, where nobody had ever made a suggestion of election malfeasance, was suddenly being splashed around a cyber symposium,” Lake County auditor Christopher Galloway told Cleveland.com.

Galloway said he quickly began working with county and state officials to see how the data had been accessed and shared.

Mike Lindell
Data from an Ohio county computer system was shared at My Pillow founder Mike Lindell’s cyber symposium in August. In this photo, Lindell waits outside the West Wing of the White House on January 15 in Washington, D.C.
Drew Angerer/Getty Images

Galloway pointed out that the screen shots and data shared at Lindell’s symposium was “a lot of nothing.” He explained that “it was some copier talking to a desktop saying ‘I am still here waiting for you to send me a print job.'”

He told Cleveland.com that someone in the Lake County commissioners’ offices appears to have plugged a laptop into an ethernet port on the day of Ohio’s May 4 primaries to access and copy the bogus data for several hours.

State and county officials shared their findings with the FBI, which is reportedly investigating. However, they have confirmed that no significant data was compromised.

“We are thrilled that our infrastructure stayed strong,” Ross McDonald, director of the…

Source…

Mobile device event logging: A panacea for the digital endemic


This content is provided by Zimperium.

Malware, like ransomware and spyware, is rampant in federal networks. If agencies have learned nothing else in the last year, they have realized that they currently face a digital endemic. With mobile security as the Achilles heel of Zero Trust, mobile event logging can be a preventive care measure protecting federal network digital health. Just like cancer screenings can give preventative insights into physical health, mobile event logging acts as a digital health screening to detect and prevent potential threats to federal networks.

Digital Device Health Screening by Maturing Event Logging

August 27, 2021, Office of Management and Budget (OMB) memorandum M-21-31 outlines a “Maturity Model for Event Log Management.”

The memorandum gives four maturity levels defined as:

  • EL0 Ineffective: Logging requirements of highest criticality are either not met or only partially met
  • EL1 Basic: Only logging requirements of highest criticality are met
  • EL2 Intermediate: Logging requirements of the highest and intermediate criticality are met
  • EL3 Advanced: Logging requirements at all criticality levels are met

At the EL1 Basic level, agencies need to ensure that they have mobile devices (smartphones and tablets) and Mobile Threat Defense (MTD) server log alerts.

Further, agencies need to collect active and cold data storage logs for mobile devices and MTD agents. Under the technical details section, the data collected includes:

  • General
  • Device
  • Application
  • Device policy settings
  • Device configurations
  • Network configurations
  • Event/Audit/Crash logs
  • MTD agent information

The MTD agent information gets even more specific, pointing out that the event logging needs to include:

  • Agent Activation Status
  • Threat Detection of Variety of Vulns
  • Phishing Protection Status
  • Tampering of Agent, App, or System
  • Privilege Escalation
  • MITM Activities
  • Remediation Actions Taken
  • Last Time Device Synched with Enterprise Systems

All of this makes sense as mobile threats continue to increase exponentially. After all, mobile is often the most vulnerable endpoint, which makes threat actors want to target it. As an…

Source…

DVIDS – News – NAVWAR Executive Director Speaks at SDMAC Economic Impact Study Event



Naval Information Warfare Systems Command (NAVWAR) Executive Director John Pope joined government, military, and industry leaders from across the region in a panel to discuss the San Diego Military Advisory Council’s (SDMAC) newly released economic impact study, Oct. 20, at the Admiral Kidd Conference Center in San Diego.

SDMAC commissions an annual economic impact study to demonstrate the significant benefits of defense-related spending and military presence in the San Diego region. During the event, Pope highlighted NAVWAR as one of the Navy’s major acquisition commands with an expertise in information warfare technology and its substantial economic impact during fiscal year (FY) 2020.

NAVWAR influences San Diego’s economy through seven channels including: contracts awarded to regional businesses, command employees, operations and maintenance spending, command-related tourism, patents, government purchase card payments, and contributions in the fields of science, technology, engineering and mathematics.

In FY 2020, NAVWAR contributed more than 29,000 jobs throughout the San Diego region and directly employed more than 5,600 people, with about 270 military workers and 5,300 civilian employees. Their combined compensation, including wages and benefits, totaled more than $900 million. Of these employees, many are highly educated with more than four-fifths of them holding at least a four-year college degree, and about two-fifths holding Master’s or Doctorate degrees.

“We have a long history with San Diego, as the region has been a strong partner in executing our mission of delivering and sustaining information warfare capabilities for the fleet and our partners around the world,” said Pope. “This relationship is ideal for both the region and the command. With nearly half of our workforce positioned in the San Diego area, we are able to leverage many of the region’s unique advantages including its close proximity to operational forces, training ranges, high-tech industry and world-class universities.”

This mutually beneficial relationship can be…

Source…