Motivation


“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.” 
― Stephane Nappo

Security is not a value added service anymore, rather it's one of the core features. Be it Finance, be it Medical, or be it IoT, it is if utmost importance to build security features into the product while developing it. 
A yet another famous quote goes 

“IoT without security = Internet of Threats” 
― Stephane Nappo


Our motivation for working on ransomware analysis is driven by our strong desire to protect and secure the world from deadly cyberthreats like CryptoLocker and WannaCry that left millions of victims helpless and locked away from their own systems. 

The primary intention of writing this blog is to record our journey of learning, analyzing, detecting and preventing ransomware attacks. Please feel free to give us your valuable inputs. 

Comments

  1. An owner needs to protests assets from all angles whereas attacker needs to know just one weak point of entry. For example, a building owner needs to secure all possible entry points (windows, A/C ducts, doors, ventilators, chimneys, rooftop entry (Especially now with drones this has become accessible), where as attacker/thief needs only one. Further, owner has to keep vigil 24x7 whereas attacker can pick and choose his time of attack.

    ReplyDelete

Post a Comment

Popular posts from this blog

Day 12: Master Slave SDN Controller Architecture

Day 1: Understanding Ransomware and how to detect them?

Day 50: Tcpreplay and tcpliveplay approach