Skip to Main Content

Our Insights

Providing you the latest industry-specific news and insights.

  • article

    SIEM vs. XDR: Advances in Security Monitoring and Cyber Defense

    BY RAE JEWELL The cybersecurity industry is chockfull of jargon, abbreviations, and acronyms. So much so that it can often be difficult to decide which tools may provide the best protection for your company. To help, we’d like to clarify some terms…

    Read more
  • article

    Dear Ramey: Watering Hole Attacks Explained

    ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS. DEAR RAMEY:  I heard this phrase “watering hole attack.” I understand the concept of a phishing email but how is a watering hole attack different? – Safari Sam DEAR SAFARI SAM: Even…

    Read more
  • report

    Healthcare Company Takes Proactive Measures to Improve Security Maturity

    A CIO saw a cyber incident as an opportunity to measure and get a baseline of the company's cyber hygiene and devise a plan for hardening infrastructure and reaching a higher level of security maturity.

    Read more
  • article

    The Hidden Costs of Cybercrime

    By Kevin Baker, Director of Cyber Strategy and Defense   This year, the global cost of cybercrime is expected to hit $6 trillion.[i] Up from $3 trillion in 2015, it’s nothing short of a big, flourishing business whose operators are relentless…

    Read more
  • podcast

    Demystifying Cyber Insurance with Marc Schein

    Steve and Marc discuss how cyber insurance can strengthen your business, the Cyber Center of excellence, risk prevention, and cyber resilience.

    Read more
  • article

    DasH into the Future of Cybercrime

    By Jaycee Roth  It is 6:30AM on a Monday morning, you are startled awake by your phone receiving a call. It is Veronica, a long-time employee complaining that she cannot access any of the data on the shared D: drive – a critical drive to the…

    Read more
  • article

    Ransomware Decryptors for a (varying) fee

    Ransomware attacks wreak havoc on business operations. Destroying recovery options, instill­ing fear and panic, and most often creating high levels of stress for IT staff, owners, and operators. A simple, but often costly fix is to just pay the…

    Read more
  • article

    Anti-virus or AI driven Endpoint Protection?

    Stephen Ramey Arete investigates a lot of ransomware attacks. In fact, 90% of our business is helping organizations big and small, recover from and investigate ransomware attacks. Variants like Maze, Sodinokibi, WastedLocker, Ryuk,…

    Read more
  • podcast

    Anatomy of an Incident Response with Stephen Ramey

    Kevin, Marc, and Steve dive in to the many facets of an incident response to give you insight into the characteristics of a typical IR victim, IR planning, importance of strong passwords, the key to successful forensics and more!

    Read more
  • article

    Remote Access and IoT Search Engines

    Recently, Arete Incident Response Tiger Teams (“Arete IR”) have responded to an increased volume of ransomware incidents involving the Sodinikibi, Phobos, and Dharma ransomware variants. The threat actors deploying these variants are known to use…

    Read more