Arctic Wolf

Eden Prairie, MN, USA
Nov 28, 2022   |  By Arctic Wolf
Security information and event management (SIEM) technology is a useful tool for many organizations. Security analysts and incident responders rely on it as a single source of truth, with events and data pulled in from multiple sources. This single pane of glass is an appealing proposition, but SIEM has limitations and disadvantages, and leaves a lot to be desired in a hybrid environment.
Nov 23, 2022   |  By Arctic Wolf
The trends shaping the industry, and the challenges impacting implementation Meeting compliance requirements is essential to building a successful and trustworthy security program. However, it’s an area of cybersecurity too often overlooked, as it’s hardly the most glamorous field in the industry.
Nov 21, 2022   |  By Arctic Wolf
Back in 2013, Gartner’s Anton Chuvakin set out to name a new set of security solutions to detect suspicious activity on endpoints. After what he called “a long agonizing process that involved plenty of conversations with vendors, enterprises, and other analysts,” Chuvakin came up with this phrase: endpoint threat detection and response. Since then, this moniker has been shortened to “endpoint detection and response” or EDR.
Nov 17, 2022   |  By Arctic Wolf
Cybercrime is lucrative. This world of hackers, malware, and brokers is now a trillion-dollar industry, the number one threat to the global economy, and is showing zero signs of slowing down. Fueled by the digital revolution, the global shift to a hybrid work model, and the rapid adoption of the cloud, more avenues have opened for threat actors to exploit. And their attack methods continue to evolve, with new innovations staying a step ahead of a cybersecurity industry determined to stop them.
Nov 16, 2022   |  By Arctic Wolf
Over the past decade, cybercrime has become big business — a $1.5T industry with an entire ecosystem of organizations run like legitimate organizations. Some offer technical leadership and step-by-step instructions through robust customer service via ransomware-as-a-service. The most brazen threat actors have even taken out pop-up ads selling their products. Yet, while the cybercrime industry has exploded in the past ten years, the truth is that cybercrime is not a new kind of threat.
Nov 15, 2022   |  By Louis Evans
With December 9 just weeks away, auto dealerships need to prepare for changes in the FTC Safeguards rule and understand how they’re going to move forward in compliance with the new rule. With roots in the Gramm-Leach-Bliley Act (GLBA), the Safeguards Rule expands the definition of “financial institution” to include a broader swath of industries that provide financial services to customers.
Nov 14, 2022   |  By Arctic Wolf
Consolidation is not a new word when it comes to security vendors. As companies grow, needs change, and new technologies develop, different vendors merging has become a common sight. Gartner has been tracking these consolidation trends, and what those trends highlight is two things.
Nov 10, 2022   |  By Steven Campbell
On Tuesday, November 8, 2022, VMware disclosed three critical-severity vulnerabilities impacting VMware Workspace ONE Assist Server versions 21.x and 22.x. If successfully exploited, the reported vulnerabilities could lead to a threat actor obtaining administrative access to the application without the need to authenticate.
Nov 10, 2022   |  By Sule Tatar
If you’re a business today, no matter the industry, part of your operations exist on the cloud. Many organizations are now cloud-first, meaning the majority of their digital operations and servers are accessed remotely via the internet. The servers are not on-premises and are not accessed through an intranet, but rather through internet-enabled software. 69% of businesses are already using the cloud but only 19% of them are paying attention to Cloud Security.
Nov 9, 2022   |  By Adrian Korn
On November 8th, 2022, Citrix disclosed a critical authentication bypass (CVE-2022-27510), a remote desktop takeover (CVE-2022-27513), and a user login brute force protection functionality bypass (CVE-2022-27516) vulnerability affecting several versions of Citrix ADC and Citrix Gateway. This bulletin only applies to customer-managed Citrix ADC and Citrix Gateway appliances as Citrix-managed cloud services are not affected.
Nov 17, 2022   |  By Arctic Wolf
What is smishing? A cyber linguist explains how text messages can be used as phishing attacks.
Oct 31, 2022   |  By Arctic Wolf
Arctic Wolf Cloud Security Posture Management security operations identify cloud resources at risk and provide guidance on hardening their posture, simplifying cloud security. Arctic Wolf Cloud Security Posture Management was built to make sure nothing gets missed; to give you greater context into your cloud platforms, identify gaps, and deliver posture hardening recommendations to keep your information safe.
Oct 31, 2022   |  By Arctic Wolf
Arctic Wolf Managed Risk enables you to discover, benchmark, and harden your security across your networks, endpoints, and cloud environments. At the core of Arctic Wolf Managed Risk is our Concierge Security Team, providing you with personal security experts who deliver a quantified, real-time understanding of your cyber risk. From technical vulnerabilities like software defects and system misconfigurations, to unsafe practices like reusing passwords, our Concierge Security Team helps focus your team’s efforts to quickly improve your security posture and reduce risk.
Oct 20, 2022   |  By Arctic Wolf
The Awarewolf's operating system is in need of an update, which reminds him of one particular unsolved case. Some time ago, on a dark and stormy night, an unlucky user felt they didn't have time to update their computer. But a series of supernatural events may have helped them change their mind...
Oct 20, 2022   |  By Arctic Wolf
A night at home for Artie turns into a series of terrifying phishing attempts. Will the Awarewolf avoid these spooky scams? And who is the ghostly figure haunting the hallways? Find out, if you dare...
Oct 18, 2022   |  By Arctic Wolf
In this episode of The Awarewolf, a Class B Divergent Poltergeist is on the loose and taken over a laptop—or a level four electoplasmic possession if you will. Learn about the importance of having a strong password, tips on how improve your passwords, and why failing to do so can be downright frightening!
Oct 7, 2022   |  By Arctic Wolf
At Arctic Wolf, we see the dark side of the internet 24x7 while protecting our customers from cyber attacks. And we carry this knowledge home with us, understanding that our friends and family are also vulnerable, especially those older than 65.
Sep 20, 2022   |  By Arctic Wolf
Uber’s information systems were recently breached, and it appears it all started with a hacker targeting one employee. Get the full rundown of what happened in this episode of Beyond the Breach.
Sep 14, 2022   |  By Arctic Wolf
The Arctic Wolf Labs team recently investigated a Lorenz ransomware intrusion, which leveraged a Mitel MiVoice VOIP appliance vulnerability (CVE-2022-29499) for initial access and Microsoft’s BitLocker Drive Encryption for data encryption. Lorenz is a ransomware group that has been active since at least February 2021 and like many ransomware groups, performs double-extortion by exfiltrating data before encrypting systems. Over the last quarter, the group has primarily targeted small and medium businesses (SMBs) located in the United States, with outliers in China and Mexico.
Sep 2, 2022   |  By Arctic Wolf
Physical security breaches by social engineers can be catastrophic for your organization's data. Join Special Agent Cipher to learn about the types of social engineering tactics used by bad actors, along with strategies to keep your organization out of harm's way.
Nov 1, 2021   |  By Arctic Wolf
Security information and event management (SIEM), security orchestration, automation, and response (SOAR), and the newer extended detection and response (XDR) solutions have become the top choices for organizations wanting a unified view of activity within their IT environments. By combining relevant data into single consoles, XDR, SIEM and SOAR technologies minimize the time analysts spend moving between platforms and make it easier to correlate the data and develop subsequent steps appropriately.
Nov 1, 2021   |  By Arctic Wolf
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule focuses on the safeguarding of electronic protected health information (ePHI) through the implementation of administrative, physical, and technical safeguards.
Nov 1, 2021   |  By Arctic Wolf
Financial institutions, particularly regional banks and credit unions, are facing challenges both in terms of safeguarding data of their customers and meeting data security compliance standards. Information technology (IT) teams in these institutions are stretched thin. They struggle with needing to meet compliance obligations while simultaneously combatting cyberthreats.

Cybersecurity is a field that requires 24x7 vigilance and constant adaptation. Arctic Wolf’s cloud native platform and Concierge Security® Team delivers uniquely effective solutions.

The cybersecurity industry has an effectiveness problem. New technologies, vendors, and solutions emerge every year—yet, we still see headlines filled with high-profile breaches. Many attacks occur – not because a product failed to raise an alert – they fail because the alert was missed or was not actioned on. To prevent these attacks, the industry needs to adopt a new approach by focusing on security operations. That’s where Arctic Wolf can help.

Arctic Wolf® Platform

Spanning thousands of installations, the Arctic Wolf® Platform processes over 200 billion security events daily. The platform collects and enriches endpoint, network, and cloud telemetry, and then analyzes it with multiple detection engines. Machine learning and custom detection rules then deliver personalized protection for your organization.

While other products have limited visibility, the vendor-neutral Arctic Wolf® Platform enables broad visibility and works seamlessly with existing technology stacks, making it easy to adopt while eliminating blind spots and vendor lock-in.

Concierge Security® Team

Arctic Wolf invented the concept of Concierge Security®. With this delivery model, we pair a team of our security operations experts directly with your IT or security staff. Your Concierge Security® Team gives you 24×7 eyes-on-glass coverage. We work with your team on an ongoing basis to learn your security needs so that they can tune solutions for maximum effectiveness and ensure that your security posture gets stronger over time.

The Concierge Security® Team combines deep security operations expertise with an understanding of your environment to deliver better outcomes. We take on tactical actions like threat hunting and alert prioritization, and strategic tasks like security posture reviews and risk management.