12Jun
The Rise of Cryptojacking: Effective Detection and Prevention
Threat Intelligence

With the growing popularity of cryptocurrency around the globe, a new form of cybersecurity threat called cryptojacking is becoming a big concern. In late 2017, Malwarebytes reported 8 million daily malware blocks, with each detected incident possibly being cryptojacking. Early this year, CSO listed cryptojacking “gold rush” as the No.1 of Top 5 cybersecurity concerns for 2018.  In response, we need to take a closer look at this threat and how to effectively detect and prevent against cryptojacking attacks.

Read More
17May
Clouds Might be Secure, but There are Blind Spots Too
Threat Intelligence

DATA DISCOVERY: DATA IS EVERYWHERE, KNOW AND PROTECT YOUR DATA

Digital evolution is driving net new challenges for data security. In this rapidly evolving digital world, data is not clearly defined, structured or secured. Today’s businesses continue to be agile and adapt new technologies, like cloud services, to meet the demands of customers. While collecting, storing and protecting data might look like standard operating procedures in legacy environments, businesses often overlook proper data safeguards in the new technology world, especially in the case of non-critical data.

Read More
26Apr
ShieldX at the RSA Innovation Sandbox
Company News

ShieldX at RSA Innovation Sandbox 2018As the RSA Conference kicked off on Monday, April 16th, I was honored to represent ShieldX as one of ten Innovation Sandbox finalists invited to take the spotlight for a three-minute pitch  demonstrating our groundbreaking security technologies to the broader conference community.

Read More
17Apr
Status Report: SX Research Team Reveals New Cloud Security Threats
Stratus Report

In 2005, Gary McGraw and Brian Chess published a taxonomy of code vulnerabilities exploited by attackers.  Today, the “Seven Pernicious Kingdoms” continue to be used by MITRE to classify vulnerabilities. With the onset of cloud computing, it is time to begin a new taxonomy that accounts for attacks on cloud infrastructure.

Read More
05Apr
The ShieldX Serverless Security Philosophy
Technology

Serverless architecture, also known as Function as a Service (FaaS), presents new challenges for securing applications built using this architecture.  FaaS is an event-driven architecture in which a small piece of code is executed on an API call or message.  Various cloud vendors support multi-language (Java, Javascript, python, C#, etc.) FaaS to make it very easy for developers to use.  Additionally, FaaS is attractive for economy and maintenance reasons because the cost is based on the execution time and users don’t have to worry about regular maintenance of web-servers or shared resources. But the architecture introduces challenges in terms of how and where to enforce security controls.

Read More
20Mar
Hot off the Press – ShieldX Networks Selected as Finalist for RSA Conference 2018 Innovation Sandbox Contest!
Company News

 

We at ShieldX Networks are very thrilled to confirm that we have been selected as a finalist in the highly coveted RSA Sandbox Contest. The Innovation Sandbox Contest is an opportunity to spotlight new approaches to information security technology, provides advice and counsel for entrepreneurs, and exposes the RSA Conference community to venture capitalists, industry experts, senior level business practitioners, and thought leaders. Please read RSA’s announcement here:  https://www.businesswire.com/news/home/20180320005165/en/RSA-Conference-Announces-Finalists-2018-Innovation-Sandbox

Read More
12Dec
Cloud Security Without Compromise
Business

According to the Telegraph, “65% of large businesses reported a cyber breach or attack in the past 12 months. Yet nine out of 10 businesses don’t even have an incident management plan in the event of a cyber breach.”*

We are in the midst of an accelerating technology shift from traditional on-premise solutions to the cloud. As such, there is growing demand to secure migrating workloads, data and assets.  But do IT organizations have the right solutions and the will to catch up and meet this challenge head on?

Read More
07Dec
Buzzword Assimilation—Understanding the APEIRO Innovation
Technology

“More than 75% of businesses are planning to implement multi-cloud architectures within the next 2 years (2018–2019).” 1

 Yet “as much as 74%” of ESG surveyed professionals “abandon their traditional security controls because they are ineffective in the cloud environments” 2 they have – or are planning for.

THE INNOVATION

Since our inception, we’ve worked to create a security solution that natively secures today’s modern enterprise IT infrastructure. One that stops forcing IT teams to slow down performance, application development and cloud adoption, or face taking on more risk and cost. Our solution? The first containerized, microservices platform for multi-cloud security.

Read More
10Oct
Why You Need Advanced Micro-Segmentation to Combat Advanced Attacks
Technology

Just as we learned thirty years ago, access control alone is not a sufficient defense, by itself. Or, to put it another way, it’s déjà vu all over again! Just as the access control provided by those first firewalls in the 1980s was not enough to secure the perimeter, micro-segmentation based on access control alone does not adequately solve the problem of lateral movement inside the multi-cloud.

Read More
11Jul
(Not)Petya “X”: A Worm’s Evolution & Cyber Kill Chain
Threat Intelligence

WHAT YOU NEED TO KNOW

Petya and its “X” variants such as NotPetya, Nyetya, Petrwrap and GoldenEye have become a contagion. Represented in global daily headlines, they appear to be involved in an evolutionary process, starting as a primitive, network worm and ransomware and transforming into something of far greater destructive, possibly deceptive, power. While NATO investigates a state actor behind these attacks, NotPetya has already claimed over 2000 victims and £100m in cost to companies like Reckitt Benckiser.

Read More

About Author

Ratinder Ahuja

Ratinder Ahuja

Founder & CEORatinder leads ShieldX and its mission as its central pivot point, drawing from a career as a successful serial entrepreneur and corporate leader, bringing with him his unique blend of business acumen, industry network and deep technical knowledge.
+ READ FULL BIO