In response to the news that Symantec has discovered a new crypto ransomware, which is affecting Australian computers and is styled around the infamous TV show Breaking Bad, Comments from Kevin Epstein, VP of Advanced Security and Governance at Proofpoint:
“While the new TV-show branding of the malware by the attackers shows their confidence in being able to operate with impunity against systems protected by legacy signature-based defenses, it’s concerning that the group reporting is just now ‘discovering’ ransomware, given the malware’s extensive coverage in major media outlets and Proofpoint’s blog over the last year. Proofpoint customers don’t need to concern themselves with ransomware, as it has been repeatedly detected and blocked on initial attack — on average five to forty hours before signature-based systems realize the malware existed.”
By Kevin Epstein, Vice President of Advanced Security, Proofpoint
Bio : Kevin Epstein is a Silicon Valley marketing executive with a Stanford MBA, a degree in high-energy nuclear physics, several technology patents in his name, founding experience at three successful small-business retail ventures, and more than fifteen subsequent years of experience in guerrilla marketing tactics at companies including Netscape, RealNetworks, Inktomi, VMware, and Scalent Systems.He has spoken at seminars addressing top executives from the Fortune 500, has been a popular guest lecturer at the Stanford Graduate School of Business and School of Engineering, and has received various awards for his impact on sales and lead generation.Kevin also serves as an outside adviser to various venture-backed and individual entrepreneurial start-up companies.
About Proofpoint, Inc.
Proofpoint Inc. (NASDAQ:PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance, and secure communications. Organizations around the world depend on Proofpoint’s expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information.More information is available at www.proofpoint.com.
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.