
Media Coverage
Armor Unlocks the Constraints Companies Face with Traditional Cybersecurity Providers Business Wire
View the original article below
View MoreView the original article below
View MoreJanuary 31st, 2022 – Armor, the global cloud-native managed detection and response (MDR) leader, announces a bold and revolutionary model for securing customer environments that eliminates the challenges inherent in traditional approaches. Armor’s new offerings leverage cloud-native cybersecurity platforms and IP sharing to unlock companies from traditional solutions while aligning to their digital transformation journey. […]
View MoreIn this report, Armor's Amer Elsad will dive deep and explore Grief operation and development since it was first observed in July 2017 as BitPaymer, as well as compare the different variants and partnerships with other threat actors and ransomware groups Download Report
View MoreArmor’s cybersecurity and compliance assessment delivers a baseline assessment for your organization’s overall cybersecurity and compliance posture.
View AssessmentBah Humbug – Nasty Active Directory Exploits Call for Immediate Patching New attacks reinforce importance of rigorous updates in wake of Log4Shell As the Log4j threat continues to unfold, there is yet another “humbug” that should be top-of-mind for businesses as we enter the throes of the holiday season. The Armor team is closely monitoring […]
View MoreWithin a matter of days, the vulnerability to Log4j (versions 2.0 to 2.14.1), which provides Java library logging capabilities sent shockwaves through the corridors of businesses from the boardroom to the data center. The zero-day attack known as “Log4Shell” (CVE-2021-44228) is concerning on a number of fronts that differ from previous high-profile attacks. The sheer […]
View MoreArmor’s cybersecurity and compliance assessment delivers a baseline assessment for your organization’s overall cybersecurity and compliance posture. The review provides a picture of your organization’s existing approach for “people, process, and technology,” a recommendation on what is needed to combat threats facing your organization, and, finally, a path to reaching your desired state of maturity. […]
View MoreDiscover the true ROI of Armor’s cloud security solution Armor Anywhere.
Check it outWe’re continuing our blog series about Living-off-the-Land (LotL) attacks by focusing on a particularly fast-moving malware called Astaroth. Click here to view the first post, which goes into the characteristics of LotL binaries and how they work. First spotted in the wild in 2017, Astaroth is a highly prevalent, information-stealing Latin American banking trojan. It […]
View MoreCyber trends tend to come and go, but one popular technique we’re seeing currently is the use of living-off-the-land binaries. The concept of “living off the land” (LotL) was first introduced by Christopher Campbell and Matt Graeber at Derbycon 3.0 (2013) and refers to attacker behavior when they use any binary supplied by the operating […]
View MoreDALLAS — Oct. 26, 2021 — Armor, the global cybersecurity company for managed service providers (MSPs), was honored with a Global InfoSec Award for “Most Innovative in Compliance” by Cyber Defense Magazine (CDM). In its ninth year, the awards honor a range of organizations, including startups, early/late-stage, and public companies as evaluated by a panel of certified cybersecurity […]
View MoreWe’ve all heard the phrase “glass ceiling” before, particularly in reference to women breaking barriers into male-dominated industries. What you probably haven’t heard of is the “broken rung” concept, where women and other minorities must first be promoted into manager positions before having the chance to shine in senior leadership roles. With 78% of women […]
View More