Search

Resources

armortext-named-a-leader-in-secure-communications
ArmorText was named a leader in The Forrester Wave™: Secure Communications Solutions, Q3 2024. According to Forrester’s evaluation, “ArmorText outclasses for SecOps, incident response, and threat intel sharing use cases.”
New and extremely sophisticated cyberattacks are taking organizations by surprise. Get the latest in our series of tabletops co-published with Crowell & Moring.
ArmorText, which safeguards communication for organizations worldwide, and the international law firm of Crowell & Moring LLP today released an update to their tabletop exercise guide, making new exercise scenarios publicly available under a Creative Commons license. The new Cyber Resilience: Incident Response Tabletop Exercises Q2 2024 addresses urgent challenges facing executives, including disruptive attacks by increasingly sophisticated criminal actors with well-publicized recent examples, as well as increasingly complex regulatory obligations.
Out-of-Band Communications [out-əv-band kə-myo͞o-ni-kā-shəns]: Any alternative channel for communications operating outside the standard, primary network…
Secure Out of Band Collaboration™ [si-kyoor out əv band kə-lab-ə-rey-shuhn]: A specific variant of out-of-band communications that further addresses security…
In the absence of secure out-of-band communications, adversaries gain substantial advantages through observing incident response communications…
A three-point checklist for evaluating Secure Out of Band Collaboration™ (SOOB-C) platforms developed alongside critical infrastructure thought leaders…
Secure Out of Band Collaboration™ (SOOB-C) is not just for crises; it is a strategic asset across various internal and external enterprise functions…
ArmorText’s approach offers unique benefits, ensuring continuity of communications when primary channels are compromised but also addressing vulnerabilities…
Partner Enablement Program
The program, designed to meet the rising demand for secure communication solutions during times of crisis, allows partners to create, manage, and administer ArmorText Private Directories and Federations/Trust Relationships.
In the last 18 months, ArmorText has seen a 33% increase in Fortune 500 customers, grown over 300% in Europe, and expanded significantly in 6 new critical infrastructure industries.
ArmorText has seen a 33% increase in Fortune 500 customers, grown over 300% in Europe, and expanded significantly in 6 new critical infrastructure industries.
Legal-Pitfalls-Why-Energy-Companies-Must-Ditch-Consumer-Privacy-Apps-During-a-Cyberattack

In the energy sector, a cyberattack is more than just a technical crisis—it’s a high-stakes moment with far-reaching consequences. Beyond the immediate chaos of containment and remediation, there are legal repercussions, regulatory scrutiny, and reputational risks to manage.

Ensuring-Operational-Continuity-During-a-Cyber-Breach-The-Role-of-Secure-Out-of-Band-Collaboration

What happens when the tools you rely on to manage a crisis become part of the problem? During a cyber breach, compromised communication channels can stall your incident response, expose critical remediation processes to adversaries, and create regulatory and reputational risks for your company.

Recovering-from-AI-Breaches-Why-Energy-Companies-Need-Secure-Out-of-Band-Collaboration

Artificial intelligence (AI) is profoundly transforming the energy sector by enhancing operational safety, efficiency, and security, as highlighted in the 2024 CESER-DoE report. However, these advancements come with significant risks. Adversaries are using sophisticated tools to target essential infrastructure, making AI a double-edged sword.

Under-Cyber-Siege-How-to-Coordinate-Incident-Response-Efforts-Away-from-Prying-Eyes

The frequency and sophistication of cyber threats continue to escalate, posing significant risks to critical infrastructures, particularly within the energy sector. Fundamental to national security and economic stability, these organizations find themselves on the front lines of cyber defense.

How-to-Safely-Engage-External-Advisors-During-Cyber-Incidents
Today’s digital world is constantly changing, with cyber threats becoming more complex and evolving rapidly. This presents significant challenges for businesses in all sectors, especially those operating within critical infrastructure. These threats don’t just affect the technical aspects; they also impact how an organization operates, its legal responsibilities, and its overall strategy.
Salt-Typhoon-Breach-Why-Enterprises-Should-Avoid-FBIs-Signal-and-WhatsApp

In the wake of the Salt Typhoon breach, a sophisticated attack exploiting telecom infrastructure to intercept calls, texts, and metadata, the FBI has recommended that private citizens move their communications to end-to-end encrypted apps like Signal and WhatsApp to safeguard their privacy.

Classified-Tier-Security-for-Protecting-High-Stakes-Communications

Sensitive communications within executive teams, boards, and other high-level functions are prime targets for adversaries, especially in today’s landscape where AI is increasingly being leveraged to assess and exploit stolen data. These communications—often involving M&A, internal investigations, HR matters, and legal discussions—can have devastating consequences if leaked.

Securing-Business-Continuity-and-Disaster-Recovery-BCDR-with-ArmorText

When incidents occur, the impact stretches far beyond just the incident response team. Disruptions affect revenue generation, servicing customers, production, and more. Reliable and secure communication is essential for mitigating these impacts.

Cybersecurity-Tips-on-the-New-Regulatory-Landscape-for-In-House-Counsel

The Association of Corporate Counsel (ACC) Chicago recently hosted a dynamic panel discussion, “Cybersecurity: Interdisciplinary Tips on the New Regulatory Landscape for In-House Counsel,” in partnership with Benesch Law.

The panel, which included ArmorText CEO Navroop Mitter, offered invaluable insights into the evolving cybersecurity regulatory landscape and how in-house counsel can better prepare for potential breaches.

Hidden-Risks-of-Enterprise-Collaboration-Tools-in-the-Wake-of-a-Cyber-Breach

Following an attack, the immediate focus is often on damage control and restoring normalcy. However, there’s a lurking danger in continuing to use your everyday communication tools. These platforms, vital for daily operations, can become liabilities after a breach, providing hackers with a backdoor for surveillance, data theft, and further attacks.

Search