Network Protection

Posted on

Dissecting NotPetya: So you thought it was ransomware

By Caleb Fenton, Joseph Landry, Nir Izraeli, Itai Liba, and Udi Shamir, Senior Security Researchers, SentinelOne Labs NotPetya was in the news this week, making headlines for being yet another ransomware attack that spread like fire – affecting organizations in several verticals across 65+ countries, drawing comparisons with the WannaCry attack that recently hit over […]

READ MORE
Posted on

Practice These 10 Basic Cyber Hygiene Tips for Risk Mitigation

For six years in a row, cybersecurity has been identified as the #1 “problematic shortage” area across all of IT. What’s more concerning is that in 2016 and 2017, there was a dramatic increase in the shortage across organizations. With companies scrambling for cybersecurity personnel, they are also distracted by involvement in an innovation race. […]

READ MORE
Posted on

Prevent Cyber Attacks Through a Lesson in Ransomware Anatomy

You’ve been suffering from flu-like symptoms for over a week now, so you drag yourself out of bed to see your doctor. Once at the appointment, the doctor does a thorough examination before determining the correct course of treatment for your infliction. And you might even walk away with a lesson in hand washing and […]

READ MORE
Posted on

Preventing Ransomware Attacks Becomes Vital in Healthcare

The deluge of ransomware attacks in 2016 on hospitals and other healthcare facilities plastered headlines. It even seemed that healthcare could be the most susceptible industry to face such attacks. Facilities providing critical care rely on access to up-to-date information from patient records or face delays that could cause malpractice or even death. With a […]

READ MORE
Posted on

Dump the Sandbox

Technology becomes obsolete quickly in a variety of industries as “newer” and “more innovative” options crop up on what feels like an almost daily basis. The same is true for the pace of technological innovation in the information security space. Traditional antivirus vendors spurred on by waning detection rates and unhappy customers have been acquiring […]

READ MORE
Posted on

I’m Getting Hacked Where? Your Data Breach Response Checklist

Jeremiah Grossman, our Chief of Security and Strategy here at SentinelOne, has a great piece of advice to increase your security immediately. Know What You’re Protecting. Grossman says, “When a company gets hacked, it’s largely because there’s a computer, a box, a website that they didn’t know they owned.” For small businesses this may be […]

READ MORE
Posted on

What is a CISO? And the 101 on How to Set Them Up for Success

The position of CISO —Chief Information Security Officer— is one of the newest roles ever created in the field of information security. As such, there’s no standard definition of the CISO’s roles and responsibilities. Does the CISO report to the board with the other C-level executives? Do they have their own budget, or do they […]

READ MORE
Posted on

Mass Surveillance: The Downsides of Traditional Endpoint Protection

The intersection of privacy and security has lent itself to some extremely contentious debates over the last few years. Encrypted messaging applications, like Signal, allow people to keep those conversations private—but what happens when the conversants are criminals? Tracking metadata may keep us safe—but what happens when the state overreaches? These are important discussions, and […]

READ MORE
Posted on

Interview with SentinelOne Co-Founder and CEO

Nick Normille, Analyst at JMI Equity, conducted an interview with our very own SentinelOne co-founder/CEO Tomer Weingarten on the state of endpoint protection. This excerpt was published this week in Nick’s newsletter. Take a look…   There are a lot of interesting things happening in endpoint security nowadays and I’ve been fascinated with the progression of the space. […]

READ MORE