Arctic Wolf

Eden Prairie, MN, USA
2012
Aug 16, 2022   |  By Dave Ockwell-Jenner
Stop me if you’ve heard this one: “we’re finding it really difficult to fill cyber roles.” In recent years, cyber-attacks have transcended industries and demographics — as has the need for strong, proactive cybersecurity. In the modern cyber landscape, everyone is a target, and every business needs to defend themselves against cyber threats. That means more organizations are on the lookout for security professionals.
Aug 15, 2022   |  By Christopher Fielder
Given the complex nature of today’s IT infrastructures, organizations need to understand how to design security programs in a way that monitors and protects every aspect of their network. Too often headlines have been made by complex networks lacking the necessary visibility to detect threats before it is too late. A big part of that visibility revolves around what many consider to be the foundation of network architecture: the endpoints.
Aug 12, 2022   |  By Arctic Wolf
At the heart of almost every business interaction lies trust. Whether logging in to a website, providing information over the phone, or interacting via email, trust is essential when the communication involves money, sensitive data, or both. To win a victim’s trust, gain access to a secure system, receive sensitive data, or insert malicious software, cybercriminals use various tools and tactics to mask their identity or disguise their devices.
Aug 11, 2022   |  By Arctic Wolf
The only constant you can count on in technology is change. From microprocessors to PCs to smartphones to software, technology continues to become faster, smarter, and more sophisticated. But make no mistake: what’s changed the most in the world of technology over the past few decades is the hacker. Hackers are highly motivated to stay ahead of the latest security trends. It’s how they keep from getting caught, and how they keep the fun and profit rolling.
Aug 10, 2022   |  By Arctic Wolf
The business world is changing fast. The shift to hybrid or remote models and the rapid adoption of cloud services are allowing employees to work from anywhere, while giving the companies they work for the chance to increase innovation and stay ahead of their competition. The cybersecurity industry has changed as well, with those same innovations creating new challenges for IT and security teams.
Aug 10, 2022   |  By Sule Tatar
On Wednesday, August 3, 2022, Cisco disclosed two critical-severity vulnerabilities (CVE-2022-20842 and CVE-2022-20827) impacting RV160, RV260, RV340, and RV345 series small business routers. Both vulnerabilities are due to insufficient validation but differ in how they are exploited.
Aug 9, 2022   |  By Nick Schneider
Exciting times are here at Arctic Wolf. This week, we celebrated a pair of awards recognizing our status as an industry innovator and employer of choice, with rankings on both the Forbes Cloud 100 and Fortune Best Medium Workplaces list.
Aug 8, 2022   |  By Sule Tatar
On Tuesday, August 2, 2022, VMware disclosed a critical-severity authentication bypass vulnerability (CVE-2022-31656) impacting multiple VMware products, including VMware’s Workspace ONE Access, Identity Manager (vIDM), and vRealize automation. If successfully exploited, the vulnerability could allow a threat actor with network access to the user interface to obtain administrative access without needing to authenticate.
Aug 5, 2022   |  By Arctic Wolf
It was an exceptionally hot July in many parts of the world, and cyberspace was no exception. High profile hacks in July affected people in all walks of life, from casual gamers and social media posters to air travelers and medical patients. Still, we hate to be the bearers of exclusively bad news, so we’ve included one silver lining amongst our usual bank of dark clouds.
Aug 4, 2022   |  By Arctic Wolf
It’s a lesson we learn early and often: sometimes the things that are best for you aren’t very much fun. Whether that’s eating your greens or flossing your teeth, taking care of yourself may not be a blast in the short-term, but it pays real dividends. The same can be said for cybersecurity compliance. You may not be starting fan clubs for compliance frameworks and regulations anytime soon, but the guardrails they put in place provide protection organizations need to prosper.
Apr 27, 2022   |  By Arctic Wolf
In this whiteboard session, Matt Trushinski, Director of Product Marketing, shows how the Arctic Wolf® Platform can stop business email compromise attacks by using a real-life example from a customer. Additional Resources: About Arctic Wolf.
Apr 22, 2022   |  By Arctic Wolf
In this whiteboard session, Brandon Tschida, Director, Presales Engineering, walks you through the Arctic Wolf® Security Operations Cloud. Threats are increasing at an exponential rate and the traditional approach of leveraging tools to combat the problem no longer works. With growing threat alerts and a lack of trained people to hire, organizations need a new approach to stay secure. With Arctic Wolf's Security Operations Cloud, security operations are delivered as a concierge service. Reduce the noise at your organization and only receive 1-2 real alerts in any given week.
Apr 22, 2022   |  By Arctic Wolf
In this whiteboard session, Matt Trushinski, Director of Product Marketing, shows how the Arctic Wolf® Platform can stop ransomware by using a real-life example from a customer. The incident started after a bad actor with stolen credentials logged into multiple systems at 5:23 a.m. Learn the details of how Arctic Wolf's Triage Team began investigating within minutes to alert the customer and stop the active ransomware in its tracks.
Apr 22, 2022   |  By Arctic Wolf
In this whiteboard session, Matt Trushinski, Director of Product Marketing, shows how the Arctic Wolf® Platform helps reduce cyber risk by ingesting raw telemetry from a customer's environment and turning it into high-quality, actionable security alerts. Learn how the platform can parse, enrich, and analyze data to improve a customer's security posture over time and harden their environment—and, ultimately, end cyber risk at their organization.
Apr 5, 2022   |  By Arctic Wolf
Learn what the Spring4Shell vulnerability is, why Arctic Wolf has developed the Open Source Spring4Shell Deep Scan, and how to use the Spring4Shell Deep Scan tool to mitigate the impact of the vulnerability.
Jan 17, 2022   |  By Arctic Wolf
The FBI has warned of a FIN7 cybercrime campaign in which attackers mail USB thumb drives to American organizations with the goal of delivering ransomware into their environments. Our latest Arctic Wolf Managed Security Awareness session, Beyond the Breach, breaks down what to look for and how to respond, shares background on this new cybercrime, and offers guidance on how to protect your organization.
Dec 22, 2021   |  By Arctic Wolf
Arctic Wolf Cloud Security Posture Management security operations identify cloud resources at risk and provide guidance on hardening their posture, simplifying cloud security.
Dec 20, 2021   |  By Arctic Wolf
After successful deployment to Arctic Wolf’s customer community of more than 2,300 organizations worldwide, Arctic Wolf’s Log4Shell Deep Scan is now publicly available on GitHub. Log4Shell Deep Scan enables detection of both CVE-2021-45046 and CVE-2021-44228 within nested JAR files, as well as WAR and EAR files.
Dec 17, 2021   |  By Arctic Wolf
Cloud Detection and Response protects you from key cloud threats like account and business email compromise, ransomware, suspicious resource usage, and phished credentials. Arctic Wolf's Concierge Security® Team continually reviews your cloud posture and works to harden your environment over time. The cloud has changed the way we work. Accelerate your cloud transformation and have confidence your business is secure with Arctic Wolf Cloud Detection and Response.
Dec 16, 2021   |  By Arctic Wolf
A zero-day threat is creating waves through the cybersecurity industry more than any other in years. On Thursday, December 9, security researchers published a proof-of-concept exploit code for CVE-2021-44228, a remote code execution vulnerability in Log4j, a Java logging library used in a significant number of internet applications. In the week since its discovery businesses worldwide are frantically trying to identify and mitigate the exploit, while security pros and experts are desperately attempting to release patches and guide organizations as new information becomes known.
Nov 1, 2021   |  By Arctic Wolf
Security information and event management (SIEM), security orchestration, automation, and response (SOAR), and the newer extended detection and response (XDR) solutions have become the top choices for organizations wanting a unified view of activity within their IT environments. By combining relevant data into single consoles, XDR, SIEM and SOAR technologies minimize the time analysts spend moving between platforms and make it easier to correlate the data and develop subsequent steps appropriately.
Nov 1, 2021   |  By Arctic Wolf
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule focuses on the safeguarding of electronic protected health information (ePHI) through the implementation of administrative, physical, and technical safeguards.
Nov 1, 2021   |  By Arctic Wolf
Financial institutions, particularly regional banks and credit unions, are facing challenges both in terms of safeguarding data of their customers and meeting data security compliance standards. Information technology (IT) teams in these institutions are stretched thin. They struggle with needing to meet compliance obligations while simultaneously combatting cyberthreats.

Cybersecurity is a field that requires 24x7 vigilance and constant adaptation. Arctic Wolf’s cloud native platform and Concierge Security® Team delivers uniquely effective solutions.

The cybersecurity industry has an effectiveness problem. New technologies, vendors, and solutions emerge every year—yet, we still see headlines filled with high-profile breaches. Many attacks occur – not because a product failed to raise an alert – they fail because the alert was missed or was not actioned on. To prevent these attacks, the industry needs to adopt a new approach by focusing on security operations. That’s where Arctic Wolf can help.

Arctic Wolf® Platform

Spanning thousands of installations, the Arctic Wolf® Platform processes over 200 billion security events daily. The platform collects and enriches endpoint, network, and cloud telemetry, and then analyzes it with multiple detection engines. Machine learning and custom detection rules then deliver personalized protection for your organization.

While other products have limited visibility, the vendor-neutral Arctic Wolf® Platform enables broad visibility and works seamlessly with existing technology stacks, making it easy to adopt while eliminating blind spots and vendor lock-in.

Concierge Security® Team

Arctic Wolf invented the concept of Concierge Security®. With this delivery model, we pair a team of our security operations experts directly with your IT or security staff. Your Concierge Security® Team gives you 24×7 eyes-on-glass coverage. We work with your team on an ongoing basis to learn your security needs so that they can tune solutions for maximum effectiveness and ensure that your security posture gets stronger over time.

The Concierge Security® Team combines deep security operations expertise with an understanding of your environment to deliver better outcomes. We take on tactical actions like threat hunting and alert prioritization, and strategic tasks like security posture reviews and risk management.