<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

All Posts

Partner Digest: Week of 6/18/2020 - RSA Conference Findings, Ransomware, PlexTrac Demo

Partner Digest

Datashield Partner Digest for the Week of June 18, 2020 - Analyzing the SOC Findings from RSA Conference 2020, Ransomware Returns With A New Twist via Mimecast, Vulnerability Management with PlexTrac Training Demo.

At Datashield, we pride ourselves on partnerships and are always looking for way to highlight what's new in the industry and with our partners. This helps us bring out the latest and greatest trends and key features for the services we use to bring you the best in MDR service.

Upgrade your cybersecurity strategy click here

Check out our latest partner updates:

Behind the Data: Analyzing the SOC Findings from RSA Conference 2020

rsa212.7 billion packets captured, 88.3 million logs analyzed and 8.08 terabytes of data written to disk. These stats make up the RSA Conference (RSAC) 2020 Security Operations Center Findings Report.

The RSA Conference SOC team again deployed the RSA NetWitness® Platform as part of its array of tools, including the RSA NetWitness Logs, RSA NetWitness Network and RSA NetWitness Orchestrator components for evolved SIEM capabilities. With this tool, the RSAC SOC Team was able to collect all the raw network traffic from a switch port analyzer (the SPAN) from the Moscone Center network, add metadata and visually prioritize threats occurring in real time. With that in mind, let’s examine three key takeaways from this year’s findings report:

  • Cleartext usernames and passwords
  • Location data and mobile devices
  • Know your vendor

Read more here.


Ransomware Returns With A New Twist: Pay Up or We'll Publish

mimecast cropped

Ransomware Attacks Have Become Larger And More Sophisticated—And Hackers Are Increasingly Stealing Sensitive Information And Threatening To Publish It Unless The Ransom Is Paid.

  • More ransomware attacks are stealing sensitive information and extorting organizations with threats to leak it online.
  • With more users working remotely during the COVID-19 pandemic, openings for hacking have multiplied.
  • A combination of cybersecurity awareness training and technology can fortify your defenses.

Ransomware is a key element in the rise in cyberthreats surrounding the COVID-19 pandemic. And increasingly, hackers are not only locking up confidential data, but also threatening to publish it online unless the ransom is paid. A combination of awareness education, technology, and the right cybersecurity hygiene can be used to protect against the threat.

Read more here.


Vulnerability Management with PlexTrac Training Demo

Vulnerability Management is the process where identified IT vulnerabilities are evaluated. This evaluation leads to vulnerability scope and mitigation steps to reduce or eliminate the potential risk to the organization.

Demo Key Takeaways:

  • What is Datashield's responsibility in a VM project? To provide a three phase MDR approach to potential vulnerabilities in a customer network.
  • Three Phases to VM: Discovery, Reporting, and Lifecycle
    • Discovery is the process of using a scanning tool like PlexTrac to identify where the vulnerabilities are and "replay threat exploits in a benign way".
    • Reporting is where Datashield comes in and provides in-depth analysis in a digestible format for organizations to action on.
    • Lifecycle Management or Remediation is where the organizations we are providing this information to are able to resolve or in some instances just notate the vulnerability for future remediation.
  • Customers are able to login and see the alerts and reports that have been run in their environment
  • Dashboard provide a snapshot of analytics that is trending over time, criticality level, and the status of each vulnerability
  • Companies utilize Datashield because:
    • We provide the infrastructure from a top-down approach
    • PlexTrac has an easy-to-use single-pane-of-glass platform
    • Saves time and money on operations setup
    • Companies can leverage and manage their entire VM program for comprehensive coordination
    • User management and timeline of events
  • SIEM Integration Advantage
    • Queryable for trending and alerting
    • Can leverage rules for traffic analysis and spikes
    • Can correlate threats with known vulnerabilities

See the full training here.

Read more blogs from Datashield

Topics from this Article

RSA NetWitness, Mimecast, News, Vulnerability Management, RSA, Ransomware, PlexTrac

Justin Bahr
Justin Bahr
Justin Bahr is one of Product Managers at Datashield focused on technology partnerships, analytics and business intelligence.

Related Posts

Top 5 Most Popular Cybersecurity Certifications

The cybersecurity analyst has become the third most valuable job description in the technology industry. The increasing security incidents to IT infrastructure, the demand for accountability from end-users, and the financial cost of successful breaches are significant reasons enterprises and startups are taking cybersecurity seriously. Ambitious professionals who choose a career in IT security are reaping the benefits of securing operating systems and deployed IT infrastructure.

What is Ransomware?

Ransomware is a form of malware cybercriminals use to encrypt data stored in computers or online servers. Cybercriminals demand payment to release the encryption key blocking the user from accessing the encrypted data. Payment is typically made through diverse mediums, including digital currency like Bitcoin. Once payment has been made, the victim is generally provided with instructions on decrypting their data.

Datashield Announces Partnership with Bishop Fox

Two cybersecurity powerhouses partner to provide defensive and offensive security services to boost enterprise companies’ security posture. Scottsdale, Ariz.— Datashield, a Scottsdale-based cybersecurity company, recently inked its partnership with offensive security services firm Bishop Fox. Both companies are based in Arizona and provide outsourced cybersecurity services to top Fortune 500 companies.