Arctic Wolf Networks

Latest Articles

Probably everyone in the audience is familiar with the tale, but I’ll lay out the basics just so that we’re all on the same page. Our story starts with three little pigs—small, plump, delicious, and utterly opposed to being eaten. The three little pigs each build a house—the first pig out of straw, the second out of sticks, and the third out of bricks. Then the wolf shows up. It asks the first pig for…
Remember the story about Willie Sutton, the bank robber? He was asked, “Why do you rob banks?” He allegedly answered, “Because that’s where the money is.” Why do cyberthieves target law firms? The answer is as straightforward as Sutton’s: Because that is where there is a wealth of valuable data. That’s why cyberattacks within the legal industry are becoming quite common. The 2017 Legal Technology Survey reported that 22% of surveyed law firm respondents suffered…
Cybersecurity can pose a daunting business challenge for small and midsize enterprises (SMEs). At its most basic level, information security shares the same composition of other critical business processes: People: Security analysts and incident responders who perform threat prevention, detection and response functions Process: The operational workflows involved in threat prevention, detection and response Technology: The security tools needed for log aggregation, correlation and analysis These people, processes and technologies represent the core components of the security operations…
IT networks churn out an extraordinary volume of activity, and this poses a cybersecurity challenge. Small and medium-sized enterprises (SMEs) may experience millions if not billions of network events on any given day. These originate from applications, endpoints, user actions, servers and a multitude of other IT sources. The odds of identifying a legitimate cyberthreat are not in your favor. The purpose of Security Information and Event Management (SIEM) solutions is to aggregate networks events…
Fifteen years ago, the Harvard Business Review asked its readers, “Can you trust your law firm?” The question then referred to whether corporate lawyers were providing sound advice to their clients. Today, it would also have to account for their approach to cybersecurity. The entire legal industry faces unique challenges in ensuring proper stewardship of client materials, due to: Widespread sharing of confidential documents–from mergers and acquisitions to tax filings–that firms must process…
Law firms are in a unique position when it comes to information security. They regularly handle copious quantities of sensitive data spanning industries. From manufacturing to government agencies, to software providers, to hospitals and beyond, legal operations represent a dangerous attack vector that cybercriminals are eager to exploit. Cyberattackers have been “aggressively targeting” law firms since 2016. In fact, in a survey of more than 200 law firms, every single respondent reported being targeted…