Cybercrime , Fraud Management & Cybercrime , Network Detection & Response

Threat Landscape: Everything Old is New Again

VMware Carbon Black's Astle on Trends to Watch Post-COVID-19
Jimmy Astle, VMware Carbon Black

It’s not so much that the threats have changed amidst the COVID-19 pandemic. It’s that the attack surface has broadened, and it’s more challenging for defenders to coordinate intelligence, tooling and processes, says Jimmy Astle of VMware Carbon Black.

See Also: Organisations Vulnerable to Insider and Cyber Threats: Misuse of SSH Keys

In a video interview with Information Security Media Group, promoting an upcoming virtual roundtable on the topic of the evolving threat landscape, Astle, a senior threat researcher, discusses:

  • The COVID-19 threat landscape;
  • Where organizations are now most vulnerable;
  • Trends to watch in the “new normal.”

Astle is a Sr. Threat Researcher on the Carbon Black Threat Analysis Unit, with over 10 years of in-depth exposure to Incident Response, Threat Intelligence, and Cyber security testing/simulations for the IC and DOD. At Carbon Black he primarily focuses on product efficacy initiatives, working with customers and partners on incident handling, and 3rd party testing labs.

Prior to Carbon Black Jimmy was a Systems Engineer in the Cyber Systems Assessments Group at MIT Lincoln Laboratory where he lead engineering efforts in a number of “live-fire” Cyber Command exercises as well as assisting critical National Security intelligence gathering missions.

For more details about this and other virtual roundtables, please visit the Virtual Roundtable registrations page.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.