Cyber Risk Analytics Management - QOMPLX
  • Products
    Identity Threat Detection and Response (ITDR) Prevent, detect and respond to identity threats in real-time Learn more
    Privilege Assurance
    Identity Assurance
    Managed Detection and Response Cost-effective cybersecurity for small to medium-sized firms Learn more
    Attack Surface Monitoring Discover cyber vulnerabilities and size of your attack surface Learn more
    Q:SCAN
    Third Party
    Whitepapers

    ManyKatz: How Active Directory Hacks Went Mainstream

    Read more
  • Services
    Offensive Security Services Gain a hacker’s perspective on your network
    Active Directory Security Assessment Identify and mitigate AD security risks to your network
    vCISO On-demand cybersecurity experts
    Case Studies

    Ransomware Case Studies

    Read more
  • Resources
    Blog Check out important cybersecurity topics and the QOMPLX perspective Learn more
    Content hub Research thought leadership, product benefits, use cases, and more Learn more
    Case studies
    Datasheets
    Overviews
    Tech specs
    Videos
    Webinars
    Whitepapers
    Datasheets

    Privilege Assurance Data Sheet

    Read more
  • Partners
  • Company
    About QOMPLX Gain unified visibility into cyber risks & trust in identity
    Leadership Learn about our executive leadership & cybersecurity expertise
    Careers & Culture Searching for a new role? Grow and thrive with us.
    Events Want to meet QOMPLX? View our list of upcoming events and trade shows
    Contact Us Discuss your firm’s cyber challenges with an expert
    Whitepapers

    Aite Impact Brief: Fixing Vulnerabilities in Active Directory and Kerberos

    Read more
    • Login
    • Request a meeting
Conti University: Four Lessons in Defense from a Ransomware Gang’s Playbook
Blog Featured

Conti University: Four Lessons in Defense from a Ransomware Gang’s Playbook

The leak of a playbook used by the Conti ransomware gang is a gift to red- and blue teams everywhere.
Aug 16, 2021 — 5 min read
Congress Needs To Get Over Corporate Ransom Payments
Blog

Congress Needs To Get Over Corporate Ransom Payments

The question of whether- and when to pay a ransom is a distraction for lawmakers. A better question: how to increase the accountability of both criminal gangs and their victims.
Jul 15, 2021 — 5 min read
Some Tips For Talking To Your Board About Ransomware
Blog

Some Tips For Talking To Your Board About Ransomware

The plague of successful attacks means ransomware is no longer the threat that “shall not be named” in the Boardroom. Here’s what to tell your Board of Directors when they ask.
Jul 12, 2021 — 5 min read
What We Know About The Kaseya Ransomware Attack
Blog

What We Know About The Kaseya Ransomware Attack

The REvil ransomware gang has reportedly compromised Kaseya, whose software is used by managed service providers. Here’s what we know...
Jul 4, 2021 — 5 min read
As Ransoms Mount: How To Keep Your Organization Safe
Blog

As Ransoms Mount: How To Keep Your Organization Safe

Recent news accounts of multi-million dollar payments to ransomware gangs underscore the financial and reputation risk of ransomware to your organization. To keep your organization safe, QOMPLX says focusing on identities and privileges is key.
Jun 14, 2021 — 4 min read
A Lesson From The Pipeline Hack: Secure Active Directory Now
Blog

A Lesson From The Pipeline Hack: Secure Active Directory Now

The Darkside ransomware attack on Colonial Pipeline looks like an escalation, but it is just business as usual for Human-Operated ransomware groups. Defenders should take note!
May 12, 2021 — 3 min read
Law Firms Feeling Pinch of Accellion Breach
Blog

Law Firms Feeling Pinch of Accellion Breach

Jones Day was among the law firms breached in an attack on Accellion’s file transfer application. It highlights the need for closer monitoring by firms of their software supply chains.
Feb 24, 2021 — 4 min read
Netfilim and Ransomware’s Long Fuse
Blog

Netfilim and Ransomware’s Long Fuse

A report on a Netfilim ransomware outbreak highlights the long fuse that these attacks have. Basic security hygiene - especially for Active Directory - can snuff them out.
Jan 29, 2021 — 5 min read
FBI Warns Hospitals on Ryuk Ransomware Credential Theft and Malicious DNS
Blog

FBI Warns Hospitals on Ryuk Ransomware Credential Theft and Malicious DNS

Organizations face an uphill battle in detecting and responding to the sophisticated, human-directed ransomware campaigns. Getting a grip on credential theft and monitoring DNS traffic are key.
Oct 29, 2020 — 5 min read
Qomplx

QOMPLX harnesses data to provide unified visibility into cyber risks and trust in identity.

  • Products
    • Identity Threat Detection and Response (ITDR)
    • Managed Detection and Response
    • Attack Surface Monitoring
  • Services
    • Offensive Security Services
    • Active Directory Security Assessment
    • vCISO
  • Resources
    • Blog
    • Content hub
    • Case studies
    • Datasheets
    • Overviews
    • Tech specs
    • Videos
    • Webinars
    • Whitepapers
  • Partners
  • Company
    • About QOMPLX
    • Careers & Culture
    • Leadership
    • Events
    • Contact Us
    • Vulnerability Disclosure Policy
    • Whistleblower hotline
    • Support

© 2022 QOMPLX. All Rights Reserved.

Privacy Policy Terms of Use