May 2017

May 2017

May 252017

Top Mistakes Managed Service Providers (MSPs) Make in Cyber Security

My team spends a significant amount of time with Managed Service Providers (MSPs) throughout the year learning about their businesses, growth opportunities and discussing how we can partner together.  Along the way, we see a broad range of the challenges and opportunities selling security solutions present. There are a variety of different types of MSPs […]

May 242017

Moving Sucks – But Your Cloud Journey Can Be Different!

By Howard Friedman ASCENT SOLUTIONS Vice President, Business Innovation   At Ascent, we work closely with our partner Armor, who highlights an important aspect of your cloud transformation that is often swept under the rug – “Moving Sucks.” That sounds provocative and it really is. But it shouldn’t be scary, and I’ll highlight where our […]

May 222017

Getting Out of the Weeds with Managed Cloud Security

While getting your hands dirty is admirable, it’s not always the best way to handle the security of your cloud data workloads and applications. Learn how landscaping and managed cloud security have more in common that you might think.

May 182017

The Adylkuzz Botnet – An Uninvited Guest

Look anywhere in the news today and it’s hard to miss coverage about WannaCry, the SMB exploit-loving ransomware that wormed its way into all our hearts. This piece of malware certainly proved a few points about the current state of cyber security – namely that patch management, network segmentation, asset management and perimeter defense are all […]

May 182017

Understanding Totally Secure #4: Outcome-Driven & Transparent Cloud Security

The final part of Totally Secure is the most critical to demonstrating the importance of cloud security in real time, being outcome-driven and transparent. Jared Day, President, Armor, explores the meaning of this element and how we bring cloud security out of the “black box” for our customers. Q: What does being Totally Secure mean […]

May 172017

Dissecting WannaCry – Understanding the Past to Anticipate the Future

| Lead Ethical Hacker

With the initial wave of WannaCry subsiding, it’s important to dissect what transpired in anticipation of the next possible emergence. We know that The Shadow Brokers released what were supposedly an arsenal of nation-state hacking tools last month. Two of which are the engines behind WannaCry targeting exclusively Windows machines. The WannaCry ransomware/worm has a […]

Chris Hinkley, OSCP, CISSP

Lead Ethical Hacker

As Lead Ethical Hacker at Armor, Chris Hinkley utilizes a decade of security expertise to design, test and deploy next generation security processes and techniques for the cloud. His work at Armor was instrumental in Armor being one of the first cloud companies globally to achieve PCI DSS compliance. Prior to Armor, Hinkley worked as a Web Developer for TargetScope, an interactive marketing and Web development company. In that role he created everything from website animations to complex and dynamic product configurations using the latest technology and development frameworks. With Armor, Hinkley has held a number of security and technology-related roles, including security engineer, lead engineer and support manager. In those roles he has serviced thousands of FireHost customer servers, including Windows and Linux, and overseen the security of all hosting environments to meet PCI, HIPAA and other compliance guidelines. Hinkley is a sought after speaker and author on cloud, security and open source topics, publishing regular columns in SecurityWeek and other industry magazines. Hinkley is a Certified Information Systems Security Professional (CISSP).

May 152017

WannaCry: The Definitive Litmus Test For Taking Security Seriously

Cyber insurance providers are always looking for that litmus test on how to judge if an organization seeking insurance is serious about their security program. I am going to say it bluntly — if an organization had significant business impact due to the WannaCry Ransomware operation, they were negligent in conducting security operations. This Microsoft […]

May 132017

Protect Against WannaCry Ransomware

On April 15th, a group of threat actors, known as the “Shadow Brokers” released a large collection of offensive security tools and data to the world. Threat actors used the deadly combo to infect thousands of computers with WannaCry ransomware in close to 100 countries, including the UK’s National Health Service (NHS), Spain’s Telefonica and […]

May 112017

Understanding Totally Secure #3: Best-of-Breed Cloud Technologies and Integrated & Automated Solutions

Learn how Armor relies on best-of-breed cloud technologies and integrated & automated solutions to drive cloud security outcomes. Ozan Talu, VP of Product Management, Armor, explores these key aspects of what it means to be Totally Secure.

May 112017

The Evolution of Mirai – What the Future Could Hold

When Mirai was unleashed a little over six months ago targeting security journalist Brian Krebs’ site with an unprecedented denial of service attack (DDoS) attack that reached 620 Gbps, everyone asked, “What will happen next?” We at Armor stated there would be an initial lull in the record-breaking DDoS activity that would coincide with an […]