Tag Archive for: Recovery

Asigra Aims to Better Secure Backup and Recovery


Asigra today added a content disarm and reconstruction (CDR) capability to its Tigris data protection platform to identify malware that might be hidden in files an organization is depending on to thwart ransomware attacks.

Asigra CEO Eric Simmons said CDR enables scanning of all files prior to encryption and delivery to the backup repository as well as scanning those files during recovery.

AppSec/API Security 2022

Ransomware attackers today routinely embed malware in files for weeks before launching their attack. As a result, IT organizations often discover the supposedly pristine files they were depending on to thwart an attack have also been compromised. The bi-directional CDR capability makes it possible to ensure that backup files are pristine before being re-introduced into a production environment, said Simmons.

Ransomware attackers are increasingly embedding malicious code deep within content files that are often nested and zipped to avoid detection. The Asigra CDR capability deconstructs files into their smallest components to determine if malicious code, macros, links or executables have been embedded. After filtering and quarantining any found malware, CDR rebuilds the original file.

CDR complements existing security tools such as zero-day exploit protection, deep multifactor authentication (MFA), variable repository naming to non-standard names to prevent recognition and encryption/deletion, soft-delete enablement and FIPS 140-2 certified encryption. The overall goal is to thwart cybercriminals that are trying to weaponize files in a way that can render backup and recovery software useless, noted Simmons.

Data protection, of course, plays a crucial role in thwarting ransomware attacks. The issue is that far too many organizations fail to test their recovery capabilities. In addition to malware being embedded in files, it’s also not uncommon for IT teams to discover the files they have backed up have been corrupted. In the event of a ransomware attack, the organization often finds itself having to choose between a major disruption and caving into the demands of cybercriminals that may not even provide the keys to decrypt data after their ransom demands are met.

Cybersecurity professionals are…

Source…

Ransomware Recovery in 2022 — Redmondmag.com


Ransomware Recovery in 2022

Date: Tuesday. September 6th at 11am PT / 2pm ET

We know that having a reliable backup can be the difference between downtime, data loss and paying a costly ransom. Unfortunately, when it comes to ransomware, most organizations data security strategies aren’t evolving to meet the threat.

During this session we will discuss how you can improve your defenses and reduce the risk of data loss through the lens of Veeam®’s 2022 Ransomware Research Report.

Among the topics we will cover are:

  • How you can prepare for a ransomware attack
  • Why immutability and air gapping are key to data security
  • Best practices for rapid reliable recovery
  • And more!

Register now!

About the presenters:

Jason Buffington, Vice President, Market Strategy, Veeam

Jason Buffington (@JBuff) has been in the data protection industry for over 30 years, working on a variety of backup, replication/failover, and BC/DR solutions within data protection vendors and Microsoft. Prior to joining Veeam, Jason was the Principal Analyst at the Enterprise Strategy Group (ESG) covering the myriad data protection vendors and providers in the IT industry. Outside of IT, Jason is an active volunteer leader in Scouting BSA. At Veeam, Jason focuses on accelerating the success of enterprise customers through Veeam’s key alliance partnerships, as well as strategic special projects, evangelizing thought leadership at key industry events, and communicating Veeam’s long-term vision and strategy.

Chris Hoff, Security & Data Protection Marketing Manager, Veeam

Chris’ career has been deeply rooted in cyber security with over 15 years of diverse technical experience. He is currently driving the Security and Data Protection Marketing effort at Veeam. Before joining the team, Chris has held various engineering, sales, and product management roles. During his career, he’s helped numerous organizations manage cyber risks by designing solutions that align with industry frameworks, programs, and compliance mandates.

Date: 09/06/2022

Time: 11:00am PT

Source…

Post-RDX recovery: Punjab’s Burail jail to amp up security, to procure 45 CCTVs, UVSS


AMIDST REPORTS of possible terrorist attacks on certain jails in Punjab, the Model Jail, Burail administration has started taking safety measures to make jail security full proof.

The administration has decided to install at least 45 high resolution CCTV cameras alongside the entire boundary wall of the jail, spreading over 14 acres of land. There is also a plan to install Under Vehicle Security System (UVSS) which is capable of detecting hidden substances on the surface of a vehicle stationed or moving with a speed of 30 kmph. There are a few jails in the country which currently have the facility of UVSS. The UVSS system contains a camera along with an automatic registration number recording system.

Besides these, a boom barrier with a capacity to stop a 9 tonne vehicle coming at a high speed will be installed at the entry of the main premises of the jail. Currently, a multilayered iron barrier exists at the entry.

The administration has flouted tenders for procurement of the CCTV cameras and UVSS, and will initiate the process to procure boom barriers in coming days. Home Secretary, UT, Nitin Yadav, has given the approval for the same. The jail administration has invited firms through Government E Marketplace (GeM).

Best of Express Premium
Delhi Confidential: Conspicuous by absencePremium
To ease spends: UPI-credit link, rural bank home loansPremium
Under vague laws, bees are fish and cats are dogsPremium
RBI leans harder to rein in inflation, but rebound in services will put u...Premium

🚨 Limited Time Offer | Express Premium with ad-lite for just Rs 2/ day 👉🏽 Click here to subscribe 🚨

“The CCTV cameras will cost around Rs 22-23 lakh. The UASS will cost around Rs 43 lakh. Shortly, tenders will be flouted for boom barriers also. We have expedited the process of procuring these systems after the recovery of RDX from the rear side boundary wall of the jail,” a prison officer requesting anonymity said. A series of meetings took place after the recovery of RDX under the supervision of IG (prisons) Deepak Purohit.

The only jail in Chandigarh which witnessed a sensational jail break in January, 2004, was in the headlines again when an RDX packed tiffin bomb like object was found abandoned near the boundary wall on May 9, this year.

In 2004, three Babbar Khalsa International (BKI) ultras along with a murder convict had escaped from the jail after digging a 98 feet long tunnel. Later, the…

Source…

Cohesity, Palo Alto to Help AI-Powered Ransomware Detection and Recovery


Cohesity, a leader in next-gen data management, has joined forces with Palo Alto Networks to integrate its Cohesity Helios next-gen data management platform with Palo Alto Networks’ Cortex XSOAR security orchestration, automation and response (SOAR) platform for improved ransomware detection and recovery.

A key factor in defeating cyber-attacks such as ransomware is how quickly the attack can be recognised and remediation steps initiated. Thisintegration providesdetailedautomatic alerts whenthe AI-powered Helios platform detects anomalies in thebackup data that could indicate an emerging attack. 

Once alerted by Cohesity, Cortex XSOAR initiatesan automated playbook totriageand mitigate the impact of a potentialcyber-attack. Integrating anext-gen data management platform with a SOAR (Security Orchestration, Automation and Response) capability can help greatly accelerate threat detection and response and decrease an organisation’s risk exposure.

The integration of Cohesity Helios and Palo Alto Networks’ Cortex XSOAR is designed to address and help alleviate the above issues.

Cohesity offers comprehensive anti-ransomware capabilities to help safeguard backup data from cybercriminals. The Cohesity architecture helps ensure that backup data is immutable and cannot beaccidentally or maliciously overwritten. Its software, driven by AI-powered insights, continuously monitors for any anomalies in an organisation’s data. If the worst happens, Cohesity helps locate and recoveraclean copy of data to reduce downtime, minimise loss, and ensure business continuity.

Brian Spanswick, CISO, Cohesity
Any delay in ransomware response and recovery could result inextendeddowntime,data loss, and business disruption. This integrationcanhelp moreeffectively link data management and data security processes — key to staying one step ahead of ever-persistent ransomware attacksandimproving an organisation’s cyber resilience.

Matt Chase, director, Cortex Alliances at Palo Alto Networks
The integration of Cortex XSOAR with Cohesity’s next-gen data management platform is a significant advancement in helping our joint customers protect themselves from the impact of ransomware…

Source…