The Relevance of Network Security in an Encrypted World
Hiding malware in encrypted traffic is a tactic increasingly employed by bad actors to conceal attacks. By one estimate, 60% of cyberattacks carried out in 2019 would leverage encryption, and that was...
View ArticleStop Ransomware with NSX Network Detection and Response
Back in 2018, some cybersecurity vendors were reporting that cryptomining malware had infected organizations roughly 10 times more than ransomware. But since then, ransomware has climbed back to the...
View ArticleLateral Movement: What It Is and How to Block It
In any given attack campaign, bad actors have a specific goal in mind. This goal may involve accessing a developer’s machine and stealing a project’s source code, sifting through a particular...
View ArticleMachine Learning, Artificial Intelligence, and How the Two Fit into...
Everywhere I look, someone’s talking about machine learning (ML) or artificial intelligence (AI). These two technologies are shaping important conversations in multiple sectors, especially marketing...
View ArticleDetecting Malware Without Feature Engineering Using Deep Learning
Detecting Malware Without Feature Engineering Using Deep Learning Nowadays, machine learning is routinely used in the detection of network attacks and the identification of malicious programs. In most...
View ArticleCountering the Rise of Adversarial ML
The security community has found an important application for machine learning (ML) in its ongoing fight against cybercriminals. Many of us are turning to ML-powered security solutions like NSX Network...
View ArticleIntroducing VMware Transit Connect for networking and security on VMware...
As you migrate and expand your deployments on VMware Cloud on AWS, your network connectivity provides the foundational infrastructure for all workloads in your SDDCs. When you then scale across...
View ArticleSimplify your micro-segmentation implementations
Micro–segmentation is a critical component of Zero Trust. But, historically, micro-segmentation has been fraught with operational challenges and limited by platform capabilities. Not anymore....
View ArticleIntrinsic Security: Take security to the next level
The other guys will have you believe that more is better. You have a problem, just buy a solution and patch the hole. Security operations too siloed? Just cobble together some integrations and hope...
View ArticleMeet compliance requirements cost-efficiently by implementing East-West...
Compliance is more than a necessary evil. Sure, it’s complex, expensive, and largely driven by manual processes, but it’s also a business enabler. Without the ability to prove compliance, you wouldn’t...
View ArticleClosing security gaps and eliminating blind spots in the data center: a...
It’s no secret that traditional firewalls are ill–suited to securing east-west traffic. They’re static, inflexible, and require hair-pinning traffic around the data center. Traditional firewalls have...
View ArticleEvolution of Excel 4.0 Macro Weaponization – Continued
Introduction The evolution of the Excel 4.0 (XL4) macro malware proceeds apace, with new variations and techniques regularly introduced. To understand the threat landscape, the VMware NSBU Threat...
View ArticleTrick or Threat: Ryuk Ransomware Targets Health Care Industry
Introduction A recent report [1] from the Cybersecurity and Infrastructure and Security Agency (CISA) has alerted the public about possible forthcoming ransomware attacks that target the health...
View ArticleDefeat Emotet Attacks with Behavior-Based Malware Protection
The security community has enjoyed a few months of silence from Emotet, an advanced and evasive malware threat, since February of this year. But the silence was broken in July as the VMware Threat...
View ArticleVirtual Patching with VMware NSX Distributed IDS/IPS
Patching: The Perennial Problem Cybersecurity consumes an ever-increasing amount of our time and budgets, yet gaps remain and are inevitably exploited by bad actors. One of the biggest gaps is...
View ArticleThe changed and unchanged: COVID-19 Cyberthreats and Malware Updates
By: Jason Zhang, Subrat Sarkar, Stefano Ortolani – VMware Threat Analysis Unit It’s been over three months since our last report on COVID-19-themed attacks.1 During this period, the tragedy of the...
View ArticleMark Your Calendars – The Modern Network for a Future Ready Business
Applications are going through a major transformation – they are becoming more dynamic, complex, and distributed. They are often built on cloud-native principles and run on-premises and in the cloud....
View ArticleNetwork Automation Can Relieve Network Engineers Stretched Thin by Covid-19
The network has never been more vulnerable. Covid-19 has flung users out from the data center to home offices—where they are accessing critical systems, applications, and other users from unsecured...
View ArticleFault Tolerant Network Design for Application High Availability
Enterprises are growing increasingly dependent on modern distributed applications to innovate and respond quickly to new market challenges. As applications grow in significance, the end-user...
View ArticleThe Case for Self-Healing Networks
Digital transformation has changed the way applications are deployed and consumed. The end-user to application journey has become increasingly complex and is a key objective for the Modern Network....
View Article