c
April 24, 2024, 6:01 p.m. |

Cloud Security Alliance cloudsecurityalliance.org

Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.Ransomware – malicious software that encrypts data until a ransom is paid for its return or is leaked without its owner's consent – remains a persistent threat despite ongoing efforts to combat it. Even with the billions of dollars spent to defend against it, it remains a lucrative business for attackers. The Zscaler threat research team ThreatLabz tracked a nearly 40 percent rise in ransomware incide...

ben ciso consent cxo data dollars leaked malicious malicious software paid persistent persistent threat ransom ransomware return software threat written zscaler

More from cloudsecurityalliance.org / Cloud Security Alliance

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Security Operations Manager-West Coast

@ The Walt Disney Company | USA - CA - 2500 Broadway Street

Vulnerability Analyst - Remote (WFH)

@ Cognitive Medical Systems | Phoenix, AZ, US | Oak Ridge, TN, US | Austin, TX, US | Oregon, US | Austin, TX, US

Senior Mainframe Security Administrator

@ Danske Bank | Copenhagen V, Denmark