Technology

Sophos steps up cybercrime fight with new tool

tech

Next-generation cybersecurity firm Sophos has acquired a cloud-based security tool that helps avert ransomware attacks.

The security alert investigation and triage automation tool is known as SOC.OS is capable of handling high volume security alerts from multiple platforms within an organisation and will enable quick response to flagged cybersecurity cases.

Following the acquisition, Sophos has expanded its security solutions to include providing alerts and events from the third-party endpoint, server, firewall, Identity and Access Management (IAM), cloud workload, email, and mobile security products.

“SOC.OS will also provide our Adaptive Cybersecurity Ecosystem with a broader set of third-party telemetry, so security analysts have better visibility into important events and alerts,” said Joe Levy, chief technology and product officer, Sophos.

Digital transformation in Kenya has brought with it an increase in cybercrimes with Sophos playing a major role in securing most regional organisations.

According to the recently published Sophos 2022 Threat Report, the evolution of ransomware attacks has become more service-based and targeted, with attackers now turning to additional extortion methods, such as stealing data and threatening to publish or sell this data, putting pressure on their victims to pay.

Sophos researchers predict that in one year, a greater proportion of ransomware attacks will be based on ransomware-as-a-service (RaaS) offerings, with specialist ransomware developers focused on creating and then leasing their malicious code and infrastructure to third-party affiliates.

“SOC.OS will also provide our Adaptive Cybersecurity Ecosystem with a broader set of third-party telemetry, so security analysts have better visibility into important events and alerts,” said Mr Levy.

With cyberattacks, such as ransomware, becoming increasingly prevalent and complex, security operations teams are under constant pressure to monitor every aspect of their organisation.

[email protected]