WannaCry Partner Coverage Roundup
When it comes to fighting cybercrime, we fight smart at Gigamon. And because you can’t secure what you can’t see, we make it our job to help you see what matters. That means partnering with the best cybersecurity companies in the business to bring the power of our Security Delivery Platform to unify your cybersecurity defenses.
The WannaCry attack has certainly been top of mind this week and Gigamon understands that you need your entire vendor community working together to help prevent not only the current threat, but also the inevitable variants, copycats and new attack vectors that will result from the new techniques and propagation methods we’ve seen with this attack.
To help you see what matters most when it comes to WannaCry, we’ve curated some of the best-published reporting and analysis from our partner community:
FireEye
WannaCry Ransomware Campaign: Threat Details and Risk Management – May 15th by John Miller, David Mainor
Palo Alto Networks
Threat Brief: WanaCrypt0r– What We Know – May 16th By Rick Howard
Traps Protections Against WanaCrypt0r Ransomware Attacks – May 16th by Michael Moshiri
UPDATED: Palo Alto Networks Protections Against WanaCrypt0r Ransomware Attacks – by Scott Simkin
Splunk
Steering Clear of the “WannaCry” or “Wanna Decryptor” Ransomware Attack – May 12 by James Brodsky
Check Point
CRYING IS FUTILE: SandBlast Forensic Analysis of WannaCry – May 16th by Pasha Pal
LogRhythm
A Technical Analysis of WannaCry Ransomware – May 16th by Erika Noerenberg, Andrew Costis, and Nathanial Quist
RSA
WHAT YOUR BUSINESS CAN LEARN FROM WANNACRY – May 16th by Rohit Ghai
ExtraHop
Ransomware Bundle Updated to Detect WannaCry Details – May 12th by Tom Roeh
Symantec
What you need to know about the WannaCry Ransomware – May 15th
WannaCry Ransomware: Top 10 Ways Symantec Incident Response Can Help – May 15th by Robert Shaker
IBM
Lessons Learned From the WannaCry Ransomware Attack and Many Others That Preceded It – May 17th by Sumukh Tendulkar
Cisco
WannaCry Type Ransomware a Growing Threat: 5 Easy Steps to Protect Your Agency – May 16th by Kenn Dodson
Healthcare Organizations: What You Need to Know About the NHS Cyberattack – May 12th by Amy Young
Fortinet
No Tears for WannaCry: Five Steps Every CISO Should Consider for Protecting Your Organization from Ransomware – May 15th by Phil Quade
WannaCry: Evolving History from Beta to 2.0 – May 15 by Kyle Yang
Imperva
What’s Next for Ransomware: Data Corruption, Exfiltration and Disruption – May 16th by Elad Erez
Plixer
WannaCry Ransomware – How Scrutinizer Customers Can Reduce Risk – May 16th by Bob Noel
Tenable
WannaCry? Three Actions You Can Take Right Now to Prevent Ransomware – May 15th by Disney Cheng
Vectra Networks
Vectra detection and response to WannaCry ransomware – May 16th by Chris Morales
Tanium
“WannaCry” / “wcry” Ransomware Outbreak: How Tanium Can Help – May 12th
Trend Micro
Why “Just Patch It!” Isn’t as Easy as You Think – May 15th by Dustin Childs