
Jason Chan, former VP of Information Security at Netflix.Alex Stamos, director of Stanford Internet Observatory, partner at the Krebs Stamos Group, and former CSO at Facebook and Yahoo!.It’s not the responsibility of one vendor to solve all cybersecurity challenges… We are partnering with these industry heavyweights so they can leverage our platform, the Cohesity Data Cloud, to help customers easily integrate data security and resilience into their overall security strategy.”Ĭohesity formed a Security Advisory Council in September, with Mandiant CEO Kevin Mandia on its board of directors. Cohesity confirms infection, and the Cortex XSOAR automation platform manages the enrichment and initiates a safe restore of business-critical data.”Ĭohesity CEO Sanjay Poonen said: “Today’s non-stop and increasingly sophisticated cyber threats require an all-hands-on-deck approach. Pamela Cyr, VP technical partnerships at Palo Alto Networks, said there is a “bi-directional flow of data and commands to rapidly detect and respond to ransomware. BigID technology is being used in DataHawk.Īn integration with Palo Alto Networks’ Cortex XSOAR is designed to provide faster ransomware response. Tenable.io powers Cohesity’s CyberScan to assess data backup environments to help ensure that a recovery situation does not introduce vulnerable conditions into production. They can all integrate with Cohesity at an API level, and some are already doing that. There are nine Data Security Alliance members along with Cohesity: BigID, Cisco, CrowdStrike, Mandiant, Palo Alto Networks, PwC UK, Securonix, Splunk, and Tenable.

Predefined policies for data privacy and protection regulations like the General Data Protection Regulation (GDPR), Payment Card Industry (PCI), and Health Insurance Portability and Accountability Act (HIPAA) help customers identify and prioritize data sets.

At Stanford, Jack is a research assistant with the Stanford Internet Observatory and Stanford Empirical Security Research Group and launched Stanford’s bug bounty program, one of the first in higher education.Customers can save time chasing false positives and reach resolution faster with more than 200 built-in classifiers and ML-driven algorithms to analyze, tag, categorize, label, and classify data sets, Cohesity claimed. Jack was named one of Time Magazine’s 25 most influential teens for 2018. After placing first in the Hack the Air Force challenge, Jack began working at the Pentagon’s Defense Digital Service. Jack is a top-ranked bug bounty hacker, having identified over 350 vulnerabilities in companies including Google, Facebook, Uber, Yahoo, and the US Department of Defense.

Jack formerly served as an Election Security Technical Advisor at CISA, where he led the development and deployment of Crossfeed, a pilot to scan election assets nationwide. Jack Cable is a security researcher and student at Stanford University, currently working as a security architect at Krebs Stamos Group.

Tod highlights some of the many things Discourse is doing right with its security program.
#Krebs stamos ransomwhere code
Stick around for our Rapid Rundown, where Tod and Jen talk about a remote code execution vulnerability that open-source forum provider Discourse experienced recently, which CISA released a notification about over the weekend. They chat about how Cable came up with the idea, the role of cryptocurrency in tracking these payments, and how better data sharing can help combat the surge in ransomware attacks. In this episode of Security Nation, Jen and Tod chat with Jack Cable, security architect at the Krebs Stamos Group, about Ransomwhere, a crowdsourced ransomware payment tracker.
