Our Insights
Providing you the latest industry-specific news and insights.
- All Topics
- Arete Analysis
- At Arete
- Client Stories
- Combating Ransomware
- Cyber Threats
- Cybersecurity 101
- Cybersecurity Trends
- Data Transfer
- Dear Ramey
- Endpoint Detection and Response
- Forensic Investigations
- Identity Protection
- Managed Services
- Recovery
- Security Recommendations
- Social Media
- Threat Actors
- Tips
- Workplace Security
- article
SIEM vs. XDR: Advances in Security Monitoring and Cyber Defense
BY RAE JEWELL The cybersecurity industry is chockfull of jargon, abbreviations, and acronyms. So much so that it can often be difficult to decide which tools may provide the best protection for your company. To help, we’d like to clarify some terms…
Read more - article
Dear Ramey: Watering Hole Attacks Explained
ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS. DEAR RAMEY: I heard this phrase “watering hole attack.” I understand the concept of a phishing email but how is a watering hole attack different? – Safari Sam DEAR SAFARI SAM: Even…
Read more - article
The Hidden Costs of Cybercrime
By Kevin Baker, Director of Cyber Strategy and Defense This year, the global cost of cybercrime is expected to hit $6 trillion.[i] Up from $3 trillion in 2015, it’s nothing short of a big, flourishing business whose operators are relentless…
Read more - article
DasH into the Future of Cybercrime
By Jaycee Roth It is 6:30AM on a Monday morning, you are startled awake by your phone receiving a call. It is Veronica, a long-time employee complaining that she cannot access any of the data on the shared D: drive – a critical drive to the…
Read more - article
Anti-virus or AI driven Endpoint Protection?
Stephen Ramey Arete investigates a lot of ransomware attacks. In fact, 90% of our business is helping organizations big and small, recover from and investigate ransomware attacks. Variants like Maze, Sodinokibi, WastedLocker, Ryuk,…
Read more - article
Ransomware Decryptors for a (varying) fee
Ransomware attacks wreak havoc on business operations. Destroying recovery options, instilling fear and panic, and most often creating high levels of stress for IT staff, owners, and operators. A simple, but often costly fix is to just pay the…
Read more - article
Remote Access and IoT Search Engines
Recently, Arete Incident Response Tiger Teams (“Arete IR”) have responded to an increased volume of ransomware incidents involving the Sodinikibi, Phobos, and Dharma ransomware variants. The threat actors deploying these variants are known to use…
Read more