Events , Fraud Management & Cybercrime , RSA Conference

Ransomware and Resilience: Where Trends Are Headed

Jon Miller, CEO and Co-Founder of Halcyon, on the Latest Ransomware, Attack Trends
Jon Miller, co-founder and CEO, Halcyon

Ransomware attackers are constantly evolving, hitting and severely hampering even the most sophisticated targets, said Jon Miller, CEO and co-founder of Halcyon. The incidents "are almost on the edge of growing out of control," he said.

See Also: The Operationalization of Threat Intelligence Programs

The ransomware threat situation is very dynamic, he said. "I don't feel as an industry we've gotten ahead of them. And I don't know if it's possible for us to get ahead of them."

That includes advanced persistent threats from Russian threat actors who "are essentially moonlighting with their tools and techniques as ransomware actors."

In this video interview with Information Security Media Group at RSA Conference 2023, Miller also discusses:

  • Shifts in attack tactics of the major ransomware actors;
  • How the attacks affect different types of entities;
  • What inspired the creation of Halcyon.

Prior to Halcyon, Miller was the chief research officer of Cylance, now BlackBerry, where he focused on malware and product effectiveness. Before joining Cylance, Miller served at Accuvant, now Optiv, where he was part of a team that established and managed the Accuvant Labs.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.