• Endpoints Of View – Cybersecurity Podcast

  • 著者: SentryBay Limited
  • ポッドキャスト

Endpoints Of View – Cybersecurity Podcast

著者: SentryBay Limited
  • サマリー

  • Endpoints Of View is your go-to podcast for in-depth expert discussions on cybersecurity topics that touch data breaches, credential theft and endpoint security. Information security professionals can tune in for fresh perspectives on defending secure cloud infrastructure, platforms, and applications from info-stealing threat actors deploying Keylogging, Screen Capture, and Malicious Injection malware.

    Episodes are brought to you by SentryBay®, the OEM at the heart of Citrix App Protection. SentryBay's Armored Client solution mitigates against credential theft and data leakage threats securing all major VDI, DaaS and Web environments, client types and operating systems.

    © SentryBay Limited
    続きを読む 一部表示

あらすじ・解説

Endpoints Of View is your go-to podcast for in-depth expert discussions on cybersecurity topics that touch data breaches, credential theft and endpoint security. Information security professionals can tune in for fresh perspectives on defending secure cloud infrastructure, platforms, and applications from info-stealing threat actors deploying Keylogging, Screen Capture, and Malicious Injection malware.

Episodes are brought to you by SentryBay®, the OEM at the heart of Citrix App Protection. SentryBay's Armored Client solution mitigates against credential theft and data leakage threats securing all major VDI, DaaS and Web environments, client types and operating systems.

© SentryBay Limited
エピソード
  • Podcast: IGEL's Partnership with SentryBay
    2025/04/08

    A significant step forward in enhancing endpoint security for organizations leveraging IGEL OS!

    In this episode of SentryBay's Endpoints of View podcast we assess the partnership between IGEL and SentryBay, highlighting why it represents a significant step forward in enhancing endpoint security for organizations leveraging IGEL OS.

    Talking Points:

    • Why IGEL, a leader in secure endpoint OS for cloud workspaces, has partnered with SentryBay, a global leader in Endpoint Threat Prevention. The partnership between IGEL and SentryBay represents a significant step forward in enhancing endpoint security for organizations leveraging IGEL OS.
    • How this partnership integrates SentryBay's "Armored Client" solution with IGEL OS to enhance endpoint security, particularly against evolving threats like keylogging, screen capture, credential theft, and AI-driven malware. The integration of SentryBay's Armored Client offers a proactive defense mechanism against increasingly sophisticated cyber threats, supporting a zero-trust security framework without compromising user experience.
    • This game changing collaboration provides a proactive, zero-trust security layer for enterprises, especially those with remote and hybrid workforces. Their joint presence at IGEL Now & Next 2025 underscores their commitment to innovation and providing comprehensive security solutions for the evolving landscape of end-user computing.
    続きを読む 一部表示
    11 分
  • Podcast: The Top 3 Ransomware Threats Currently Active In 2025
    2025/02/11

    What are the top three ransomware threats currently active, and what makes them so dangerous?

    In this episode of SentryBay's Endpoints of View podcast we assess the top three ransomware threats currently active – LockBit, Lynx, and Virlock. LockBit is known for its efficient encryption, double extortion tactics, and use of a Ransomware-as-a-Service (RaaS) model, allowing widespread distribution. Lynx, a newer group, aggressively targets small and mid-sized businesses using double extortion tactics. Virlock is unique in that it not only encrypts files but also infects them, turning each into a polymorphic file infector, enabling rapid spread via cloud storage.

    Talking Points:

    • How does LockBit's Ransomware-as-a-Service (RaaS) model impact the spread of ransomware attacks? The RaaS model enables LockBit to expand its reach by allowing affiliates to distribute the malware. This means that multiple actors can deploy the ransomware, leading to widespread attacks across various industries and a greater volume of victims. This significantly increases the potential impact and makes it more difficult to track and stop.
    • Why are small and mid-sized businesses specifically targeted by the Lynx ransomware group? Lynx specifically targets small and mid-sized businesses because they often have weaker security measures compared to larger corporations, making them easier targets. Lynx exploits these vulnerabilities to quickly gain access and extort these companies, knowing they may be more likely to pay to avoid data breaches and operational disruptions.
    • How does the Virlock ransomware differ from other types of ransomware, and how does it spread? Virlock differs from traditional ransomware because it not only encrypts files but also infects them, making each encrypted file into a polymorphic file infector. This unique trait allows Virlock to spread rapidly, particularly via cloud storage and collaboration platforms. When an infected file is shared, collaborators who open the file inadvertently trigger the infection on their systems, leading to further propagation within an organization.

    This episode also examines the ways to counter the growing ransomware threat including proactive defenses that block attacks at their source. Specifically, adopting advanced tools which features endpoint isolation to prevent keylogging and credential theft—common entry points for ransomware attacks.

    続きを読む 一部表示
    16 分
  • Cybersecurity Risks in the Middle East
    2025/01/14

    The Middle East is experiencing rapid digital transformation and economic growth, making it an increasingly attractive target for cyberattacks.

    While historically the region has seen a relatively low number of publicized cyber incidents, the potential impact of a successful attack is significant, due to the region's crucial role in the global energy sector and its growing dependence on digital technologies. The costs of data breaches in the region are already high, and various cyber threats are becoming more sophisticated. This briefing outlines the key vulnerabilities, risks, and necessary steps for mitigating potential cyber threats in the Middle East.

    Talking Points:

    • High Potential Impact to Energy Sector: The energy sector is considered one of the most important and sensitive sectors that must be protected from cyber attacks due to the devastating impact this sector might have on Middle Eastern economies.Geopolitical Tensions Exacerbate Risk: Complicating matters is geopolitical tension in parts of the Middle East: With its escalation, any high-profile or state-owned businesses will be at increased risk of cyber attacks from hacktivists.

    Proactive cybersecurity solutions that isolate endpoints and prevent credential-based exploits are essential for organizations in the Middle East to safeguard their infrastructure, maintain operational trust, and ensure resilience against evolving cyber threats.

    続きを読む 一部表示
    13 分

Endpoints Of View – Cybersecurity Podcastに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。