#BHEU: Zero Trust Protects Against Ransomware, Claims Engineer
The session titled 'Moving Beyond Threat Detection – A Look at The Future of Cybersecurity with Zero Trust,' focused on the state of cybersecurity and how to protect against ransomware with a zero trust architecture.
The session began with a thorough exposition of software – the tagline being that its possibilities are “endless. There is good software and bad software,” stressed Jenkins, and “yes, malware is just software.” Yet, malware is having a “devastating” impact on all sectors. “560,000 malware infections are found each day, attackers hit 1-4 businesses each day and there are over one billion pieces of malware in existence,” warned Jenkins. “The malicious possibilities are endless.”
Continuing his exposition, Jenkins highlighted early types of malicious software. “AIDS Trojan is one of the first documented versions of malware,” remarked Jenkins, which dates back to 1989. Floppy-disc-based, victims were forced to pay $189 to release their encrypted data.
“If we fast forward to today, malware looks very different,” rued Jenkins. He highlighted the