July 7, 2023, 10 a.m. | Tom Kellermann, SVP Cyber Strategy, Contrast Security

Security Boulevard securityboulevard.com


Insight #1




When responding to a ransomware attack, recognize that most ransomware will deploy a remote-access Trojan (RAT).  If you do not identify and terminate the RAT, the attackers will return.


 


Insight #2




If you conduct pen tests, remember that you need to have ground truth per your applications. That ground truth can only be garnered by running

Interactive Application Security Testing (IAST)






 


Insight #3


As evidenced by the

Cyber Bank Heists

report, cybercriminals are stealing non-public market information. …

access attack attackers cyber cybersecurity cybersecurity insights cyber strategy deploy identify insight insights pen ransomware ransomware attack rat return strategy tests tom kellermann trojan truth

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Intern, Cyber Security Vulnerability Management

@ Grab | Petaling Jaya, Malaysia

Compliance - Global Privacy Office - Associate - Bengaluru

@ Goldman Sachs | Bengaluru, Karnataka, India

Cyber Security Engineer (m/w/d) Operational Technology

@ MAN Energy Solutions | Oberhausen, DE, 46145

Armed Security Officer - Hospital

@ Allied Universal | Sun Valley, CA, United States

Governance, Risk and Compliance Officer (Africa)

@ dLocal | Lagos (Remote)