NetWorks Group Blog

Jyothish Varma

Jyothish ‘JV’ Varma is the VP of Product Management at NetWorks Group. In this role, he is responsible for strategy & roadmap and marketing of security products & services. JV holds a CISSP certification and has over 12 year’s experience in the security products & services industry. JV has a Master’s in Business Administration from Emory Goizueta Business School and a Master’s in Computer Science from North Carolina State University.
Find me on:

Recent Posts

Atlanta Ransomware Attack: Lessons Learned

Posted by Jyothish Varma on Apr 5, 2018 9:30:44 AM

Atlanta Ransomware Attack: Lessons Learned

Every ransomware attack is devastating to the organizations affected. But they have the potential to teach valuable lessons to you and your organization about malware and endpoint security, and they can help you reflect on your current threat management strategies. Read on to learn about the recent Atlanta ransomware attack and how you can build on the knowledge gained to shore up your company's security.

Read More

Understanding The Cyber Kill Chain

Posted by Jyothish Varma on Mar 1, 2018 11:56:48 AM

The cyber kill chain concept is based on the military kill chain, which uses a three-stage process that covers target identification, defending against the attack and wiping out the target. Lockheed Martin started using the "kill chain" to refer to information security. It applies these same steps to cyber attackers who attempt to break into its computer network and corrupt or steal data. While the analogy may not always be a perfect one when you compare the cyber kill chain to the original military one, this concept gives you the opportunity to break a cyber attack into easily comprehensible stages.

Read More

Topics: Information Security, Threat Management

HIPAA Covered Entity: Know How to Respond to a Cyber Security Incident

Posted by Jyothish Varma on Jan 18, 2018 9:33:59 AM

Know How to Respond to a Cyber Security Incident

Organizations that fall under the purview of HIPAA have to respond quickly to a cyber attack. The Office for Civil Rights (OCR) under the U.S. Department of Health and Human Services (HHS) issued a step-by-step guide to aid organizations. As a covered entity, your organization must have a contingency plan and incident procedures in the event of a security breach.

Read More

Topics: Information Security, Incident Response, Threat Management, Healthcare, HIPAA

NetWorks Group is listed as one of the “Key Innovators” in MarketsandMarkets’ Managed Detection and Response Market – Global Forecast to 2022 Report.

Posted by Jyothish Varma on Jan 8, 2018 3:00:31 PM

NetWorks Group is listed as a key innovator in the MarketsandMarkets’ Managed Detection and Response Market – Global Forecast to 2022 Report (Section 11.13.3 under Company Profiles (Page No. - 76)). This research report categorizes Managed Detection and Response Market by Security Type (Endpoint, Network, Application, Cloud), Deployment (On-Premises, Hosted), Organization Size (SMEs, and Large Enterprises), Industry Vertical, and Region. According to MarketsandMarkets, the Managed Detection and Response (MDR) market size is expected to grow from USD 335.5 Million in 2016 to USD 1,658.0 Million by 2022, at a Compound Annual Growth Rate (CAGR) of 31.6% during the forecast period. The base year considered for the study is 2016 and the forecast period is from 2017 to 2022.

Read More

Topics: Managed Detection & Response

Understanding OCR Guidance on Ransomware

Posted by Jyothish Varma on Dec 27, 2017 10:11:00 AM

Understanding OCR Guidance on Ransomware

With the prevalence of data breaches, ransomware has also come to the forefront of security threats. This malicious software is created by hackers who encrypt data and hold it hostage. Users are denied access to this data until they pay a ransom to the hacker.

Read More

Topics: Managed Detection & Response, Information Security, Threat Management, Healthcare, HIPAA

The Impact of Cybersecurity Breaches in the Healthcare Industry

Posted by Jyothish Varma on Dec 14, 2017 10:16:05 AM

Cybersecurity breaches reached unprecedented levels in 2017. Few were spared as businesses and government entities alike -- including Equifax, the British National Health Service and even the U.S. National Security Agency, as well as dozens of others -- were hit with data breaches. While frequent targets like the financial sector and retail industries experienced their fair share of attacks, the healthcare sector is now the primary target of hackers, accounting for 25 percent of all data breaches. Understanding why this is happening and the consequences of it will help you improve your company's cybersecurity defenses and mitigate future threats.

Read More

Topics: Managed Detection & Response, Information Security, Threat Management, Healthcare, HIPAA

3 Common-Sense Ways to Prevent Phishing Attempts

Posted by Jyothish Varma on Nov 30, 2017 3:28:04 PM
Today, phishing is one of the most dangerous forms of online threats. In the fourth quarter of 2016 alone, social media-based phishing attempts increased 500 percent As if that weren't enough, a recent 2017 report found that the average business user comes across at least one phishing attempt via email each day.  Luckily, you can reduce the risk of phishing (and ensure you're protecting your endpoints) by recognizing the signals of phishing and taking proactive steps to prevent attacks.

What Is a Phishing Attack?

Phishing attacks take place when a hacker or thief attempts to steal sensitive information through electronic communications. This information includes but is not limited to passwords, usernames and credit card information, by sending electronic communications that look like they are from a trustworthy source. Each year, successful phishing attempts claim more than $5 billion from US consumers and businesses.
Read More

Topics: Ethical Hacking, Information Security, Threat Management

Discussing Cybersecurity in the Boardroom

Posted by Jyothish Varma on Sep 20, 2017 12:55:41 PM

Discussing Cybersecurity in the Boardroom

Cyber warfare is a very real and present danger, with more companies finding themselves on the losing end of the battle. Statistics from security monitoring services show that in a single hour alone, there are about 184,188 recorded cyber security breaches. This should be a wake-up call to key stakeholders, the majority of whom assume that cybersecurity is simply an IT problem and responsibility.

Read More

Topics: Information Security, Threat Management

Estimating Total Cost of Ownership of Your SIEM Deployment

Posted by Jyothish Varma on Aug 18, 2017 11:15:33 AM

Are you in the market exploring options for security log monitoring and management? If so, I’m sure you are inundated with requests for a meeting from various SIEM (Security Information and Event Management) vendors.

Read More

Topics: Security Monitoring, Managed Detection & Response, Information Security, Threat Hunting, Incident Response, Threat Management

5 Reasons Why Security Log Monitoring Is an Effective Part of Any Cybersecurity Framework

Posted by Jyothish Varma on Aug 9, 2017 9:53:54 AM

A comprehensive cyber security framework consists of several components, and one of the most important among them is security log monitoring. Without an effective security log monitoring and management policy in place, a company runs the risk of non-compliance, and perhaps fines, if there is ever a data breach. In order to maintain compliance with guidelines laid out by laws like HIPAA, and frameworks such as PCI, companies need to have an effective security monitoring solution in place that can help them collect and analyze log information so they can detect and respond to cyber attacks.

Read More

Topics: Security Monitoring, Managed Detection & Response, Information Security, Compliance

Subscribe to our blog!