Ransomware: A Problem of ExcessesBeyondTrust's Morey Haber and James Maude on Reducing Ransomware Risk
You can't decrease the motivation of ransomware attackers. But you can curb their success by bolstering your own enterprise's approach to access, credentials and privileges. Morey Haber and James Maude of BeyondTrust share insights on ransomware defense.
In a video interview with Information Security Media Group, Haber and Maude discuss:
- The most successful of today's ransomware techniques;
- How the actual malware has been refined;
- How to strengthen defenses by addressing access, credentials and privileges.
Haber has more than 25 years of IT industry experience. He currently oversees BeyondTrust security and governance for corporate and cloud-based solutions and regularly consults for global periodicals and media. He joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. He had served as a product owner and solutions engineer at eEye since 2004. Prior to that, he was beta development manager for Computer Associates Inc. Haber began his career as a reliability and maintainability engineer for a government contractor, building flight and training simulators. He is the author of the books "Privileged Attack Vectors," "Asset Attack Vectors," and "Identity Attack Vectors."
Maude has broad experience in security research and conducting in-depth analyses of malware and cyberthreats to identify attack vectors and trends in the evolving security landscape. His background in forensic computing and active involvement in the security research community make him an expert voice on cybersecurity. He regularly presents at international events and hosts webinars to discuss threats and defense strategies.