
If It's Smart, It's Vulnerable

For the most part, the gangs operate like corporations, with human-resources departments and complex bureaucracies. Prominent groups issue press releases (“We are pleased to announce that we have successfully encrypted Henry Schein’s network and extracted 35 Terabytes of sensitive data”) and have user-friendly homepages on the dark web, where victi... See more
Amanda Chicago Lewis • Secrets of a ransomware negotiator
Given that break-ins into corporate networks are now routine (and sometimes state-sponsored), the idea that data is somehow safer behind the corporate firewall is absurd. The only way to effectively secure data is strong encryption combined with rigorous hygiene around key management and access controls. This can be done as effectively in the cloud
... See more