The Changing Face of Ransomware

January 10, 2022

Dwell time, double extortion, supply chain attacks - ransomware has changed considerably over the course of the year, and CyberArk's Andy Thompson says there is much we can learn from the attacks - both the unsuccessful and successful ones - and how they take root.

In a video interview with Information Security Media Group, Thompson discusses:

  • How ransomware attacks and attackers have evolved;
  • Trends and techniques that should concern you;
  • How to rethink ransomware defense strategies.

As a technical evangelist for CyberArk, Thompson is responsible for providing guidance to each regional customer in securing their organizations with CyberArk technologies and security best practices to prevent credential theft and breach. He has spent the past 20 years in the fields of web development, systems engineering/administration and architecture, and the past six years in information security and architecture, primarily focusing on large retail organizations. Thompson is active in the information security communities of Texas as a member of Shadow Systems Hacker Collective and the Dallas Hackers Association.

Previous Video
Implementing an Identity Security Program
Implementing an Identity Security Program

As organizations look to streamline, they can introduce unknown security gaps making them vulnerable to ran...

Next Article
What a 100-Year Plant Disease Reveals About Endpoint Privilege Security
What a 100-Year Plant Disease Reveals About Endpoint Privilege Security

At the turn of the 20th century, a little-known plant disease called white pine blister rust emerged in the...