Featured
Ransomware Solutions and How We Can Help
Gerry Miller, CEO at Cloudticity and Aaron Gettings, Director of Engineering at Cloud Storage Security
The fallout of a ransomware attack can be complex, costly and time-consuming. Prevention is key. Cloudticity and Cloud Storage Security provide guidance and tooling, enabling you to take action. Tune in for an introduction to:
- How to detect ransomware in cloud storage
- How to detect ransomware in cloud infrastructure
- How to manage the cybersecurity life cycle
All episodes
-
Ransomware Challenges in Healthcare
Gerry Miller, CEO at Cloudticity and Steven Hess, CEO at Cloud Storage Security
Ransomware can paralyze a company, halting operations and disrupting its ability to provide care. This talk highlights recent notable ransomware attacks in the healthcare industry and what went wrong, touching on entry points, attack signals, and the cost of not having a plan in place. Join us to learn from the missteps of Change Healthcare and others.
-
Best Practices for Ransomware Prevention, Defense, and Mitigation
Gerry Miller, CEO at Cloudticity and Rich Vorwaller, CPO at Cloud Storage Security
For Change Healthcare and other recent victims, critical security protocols were not enabled, making them low hanging fruit in the eyes of attackers. You can do better. A layered defense strategy is critical when it comes to stopping ransomware. Is your organization following these best practices?
- Enabling cross-region/multi-zone backups
- Simulated testing
- Scanning the code level
Find out what you can do today to lower your risk. -
Ransomware Solutions and How We Can Help
Gerry Miller, CEO at Cloudticity and Aaron Gettings, Director of Engineering at Cloud Storage Security
The fallout of a ransomware attack can be complex, costly and time-consuming. Prevention is key. Cloudticity and Cloud Storage Security provide guidance and tooling, enabling you to take action. Tune in for an introduction to:
- How to detect ransomware in cloud storage
- How to detect ransomware in cloud infrastructure
- How to manage the cybersecurity life cycle