Celebrating Three Decades of Employee Excellence

When Sonic Systems entered the firewall market in 1996, the company had fewer than 40 employees. Today, the company we now know as SonicWall employs more than 1,600 people in 37 countries.

There are a number of unique benefits for choosing a career at SonicWall, including having the chance to work on the cutting edge of cybersecurity. But while a great cybersecurity portfolio can attract top talent, it takes good leadership and a great corporate culture to keep them.

As we interviewed our employees in celebration of our 30th anniversary, four factors repeatedly emerged as integral to SonicWall’s culture: Opportunity, Family, Diversity and Philanthropy.

Opportunity

“At SonicWall, each of our people can advance their careers through hands-on experience and constant learning while receiving highly competitive compensation and rewards,” SonicWall Chief Administrative Officer Matt Neiderman said.

Ruby W., a SonicWall sales engineer (SE), agreed, citing her willingness to learn as key to both her career development and her ability to continue providing higher levels of customer service.

“Learn as much as you can: Security is ever-changing and you have to change, learn and grow with it,” Ruby said. “Keep up with the changing technology and teach your customers — they will appreciate you and trust you even more.”

Ruby was one of several employees who appreciated that their roles offered opportunities to hone their craft among groups of like-minded individuals. Another was Graphic Designer Mike B., who joined SonicWall in 2019.

“My experience at SonicWall has helped me develop as a designer and improved my career as a whole,” Mike said. “The team is the most skilled and professional group of individuals. Everyone is positive and focused on improving the company’s performance.”

This positive, team-oriented philosophy provides an environment ideally suited for helping employees succeed.

“My favorite thing about SonicWall is that everyone is dedicated to our Boundless Cybersecurity mission. This shared vision results in an amazing collaborative environment where everyone can make an impact,” said Terri O., VP of Marketing.

Family

Even among newer employees, many reported that the tight-knit environment felt more like a family than a group of co-workers.

“We have a good mix of hard-edged accountability and a warm, fuzzy, family-like atmosphere in our company,” said Senior Technical Lead John L.

This view wasn’t limited to just one or two departments, however. Social Media Manager Jamie L. credited her coworkers with creating an environment conducive to both professional and personal growth.

“I have loved my experience at SonicWall. It feels like a big family,” Jamie said. “Everyone that I have come into contact with is kind and willing to help me further my knowledge and help me grow.”

While employees enjoy SonicWall’s close-knit atmosphere, they also expressed appreciation for family-friendly policies such as flexible hours and remote work.

“Over the years, we have watched not only employees grow, but also their families. We all work very hard, but it’s knowing that my SonicWall family is behind me every day that makes it all worthwhile,” Sarah C., VP of Human Resources, said.

This support extends far beyond the daily 9-5. Several employees said their SonicWall family had been there to celebrate things like weddings or the arrival of a new baby, and had also lent their support during life’s challenges.

“A huge standout for me was when my son was diagnosed with cancer,” Tiffany H., Sr. Manager, Inside Sales, said. “I came back to the office and everyone was wearing green (the color for lymphoma) to show me that they were there to support me and my family.”

Diversity

SonicWall employees may all be working together toward a shared goal, but their varied experiences mean that each person brings to bear their own unique contribution. SonicWall has long focused on fostering an inclusive and equitable environment, and this begins with the recruiting and hiring processes.

“We are committed to hiring people from diverse backgrounds and cultures and providing each member of our team meaningful opportunities to contribute to the success of the company,” Neiderman said.

As a result, there is no “typical SonicWall employee” — the company prides itself on both bringing together a diverse group of employees in each of its offices, and on celebrating the different beliefs and values of all its employees.

For decades, SonicWall employees and their families have enjoyed celebrating holidays from across the world, as well as participating in special events with music, food, games, costumes, contests and more.

Due to SonicWall’s global presence, some roles offer an opportunity to experience other cultures more directly.

“I have enjoyed the travel opportunities I have been afforded during my time here at SonicWall,” said Technical Support Sr. Advisor David W. “I’ve been to India and South Korea to complete training and to support major customer deployments. Most of all, I really enjoy learning about different cultures and working with people from diverse backgrounds.”

Sr. Test Principal Engineer Keith C. agreed. “I love SonicWall’s diversity and the opportunity to work with people from all over the world,” he said.

Philanthropy

Senior Director of Demand Generation Diane W. summed up SonicWall’s approach to giving as such: “SonicWall thinks globally and acts locally.”

SonicWall offers employees several opportunities throughout the year to help make their communities a better place. Each December, offices support a local charity with donations — for example, the SonicWall headquarters in Milpitas, Calif., donates to the Second Harvest of Silicon Valley, while the Dallas office supports the North Texas Food Bank.

But while many of our charitable endeavors are built around the idea of “helping out at home,” employees are always willing to answer the call when disaster strikes — regardless of where it occurs.

In spring 2021, for example, India experienced a massive wave of severe COVID-19 infections. During this time of widespread suffering and loss of life, SonicWall employees worldwide came together with donations to help ease the hardship of both fellow employees and the area as a whole.

… and in return, Loyalty

“Our decades of working with channel partners to deliver scalable security solutions means that we are big enough to deliver cutting-edge and cost-effective technology, but small enough to never forget the value of the people behind our success,” Neiderman said.

This is reflected in the number of SonicWall employees who choose to spend their career at SonicWall. Out of 1,600 employees, there are 130 who have been with the company for 10-15 years, 67 employees who have spent 16-20 years working for SonicWall, and 16 who have spent over a fifth of a century with us.

During our 30th anniversary celebration, SonicWall wants to take the opportunity to thank our employees for their hard work and their dedication, but most of all, for their loyalty: Whether it’s your second day or your 20th year, your continued efforts at helping safeguard the world’s networks from cybercrime have helped make SonicWall the company it is today, and your contributions will continue to drive improvements on every front over the next 30 years.

SonicWall NSsp 15700 vs. Fortinet FG 3600E

Choosing between two leading enterprise firewalls

Legacy cybersecurity solutions are no match for today’s hyper-distributed businesses. Safeguarding against modern threats requires stronger secure gateways capable of protecting a radically redefined perimeter. To stay ahead of the evolving threats, it’s time for security professionals to embrace modern Next-Generation Firewalls (NGFW).

The firewalls of today are vastly more agile, more capable, and more powerful than when the technology debuted 20 years ago. But not all firewalls are created equal — they come in different form factors, network interfaces and security packages. These packages may or may not include services such as IPS, application control, content filtering, anti-malware, DNS security and cloud management. To further complicate matters, there are enough firewall vendors in the market today that it can be difficult for the average customer to choose the right solution for their environment.

In March 2021, SonicWall commissioned Tolly Group to compare SonicWall NSa 2700 with the Fortinet FG 100F — and their report showed the NSa 2700 is a better choice for medium enterprises. Then, in July 2021, Tolly Group compared the price and performance of two firewalls designed for larger enterprises — SonicWall’s NSsp 15700 to the Fortinet FG 3600E. The two firewalls have a similar form factor and are comparable from a single appliance price point.

When choosing the right security solution, there are three key considerations: price, performance and protection. The ideal choice is the device that costs the least while providing similar performance and a comparable or better feature set than the alternative. Tolly used the published numbers and prices from both vendors to calculate the Total Cost of Ownership (TCO) for a 3-year, High-Availability appliance model with comparable security features. The full report is here. Here are a few of the key findings:

SonicWall’s three-year TCO is less than half that of Fortinet

This report compares SonicWall’s NSsp 15700 Total Secure Essential Edition with Fortinet FG-3600E Unified Threat Protection, both configured in HA mode. The SonicWall solution has a significantly lower TCO mainly because SonicWall does not require the purchase of a firewall license for the second unit. At $885,000, the Fortinet FG 3600E 3-year TCO is more than two times the $440,200 price of the SonicWall NSsp 15700 (see Figure 1).

SonicWall’s advertised threat prevention throughput is more than 2.5 times that of Fortinet

When looking at product data sheets, it’s not uncommon to be overwhelmed with multiple performance numbers. When evaluating a security appliance, you should look for performance numbers that will most closely replicate how you will use the solution in your environment. In the case of a firewall, that number is usually threat protection/prevention with most security features turned on.

While the two firewalls have similar form factor and price per appliance, SonicWall’s solution offers 80 Gbps threat prevention throughput, compared to Fortinet’s 30 Gbps.

SonicWall has a dramatically lower price-to-performance ratio

At the end of the day, what is most important to an organization is how much they have to spend to protect their environment while maximizing performance. For a firewall, that measure is commonly referred to as the price-to-performance ratio and is calculated by dividing the TCO by the relevant performance benchmark.

As detailed in Table 1, the cost of protecting each gigabit per second of network traffic for Fortinet ($29,500) is 5.5 times higher than SonicWall ($5,368).

Conclusion

Firewalls have different pricing, packages, performance, bells and whistles, which can make it difficult to choose between them. Given that a firewall purchase is a long-term investment, it is important to obtain and compare the three- to five-year total cost of ownership as opposed to just looking at list prices. It is clear that SonicWall firewalls, including both the NSa 2700 for medium enterprises and the NSsp 15700 for large enterprises, outperform comparable Fortinet firewalls at a lower total cost of ownership.

Cybersecurity News & Trends

The Mid-Year Update to the 2021 SonicWall Cyber Threat Report found its way into the Wall Street Journal, CNN and other news outlets. Plus, SonicWall’s big 30th anniversary earned mentions all over the global news cycle. In industry news, China crushes cyberweakness, Trickbot links, Blackberry’s “BadAlloc,” hackers attack rural sewage, surgeries cancelled, care diverted, and the Dallas Police Department announces a serious breach – four months late.


SonicWall in the News

SonicWall and Fusion BPO Services enter into strategic partnership — CRN India

  • SonicWall has entered into a strategic partnership with Fusion BPO services, a global BPO with headquarters in Kolkata, India and Draper, Utah (US). The new partnership will feature SonicWall’s state-of-the-art next-generation firewalls (NGFW) for SMB, enterprise, and government organizations. Fusion incorporates a wide range of call center services from 18 centers located in nine countries.

The Ruthless Hackers Behind Ransomware Attacks on U.S. Hospitals: ‘They Do Not Care’ — Wall Street Journal

  • The Mid-Year Update to the 2021 SonicWall Cyber Threat Report continues to reverberate. This time by the Wall Street Journal reporting on recent ransomware attacks on hospitals in the U.S. The attacks were devastating: a chain in Las Vegas was all but closed; in Oregon, they shut down monitors tracking patient vital signs, and in New York, they briefly closed a trauma center. In addition, the report notes that a cybercrime gang known as “Ryuk” may account for one-third of the 203 million U.S. ransomware attacks in 2020 cited in SonicWall’s report.

Friday 13: 5 tips to protect yourself from ‘bad luck’ from cyber attacks — CNN Brazil

  • CNN, one of Brazil’s most prominent news outlets, drew a parallel between superstitions associated with “Friday the 13th” and the specter of falling victim to a cyberattack. The reporter playfully warns that readers can avoid the “bad luck” of cyberattacks on a then-upcoming occurrence of the day by taking certain precautions. However, the story turns very serious when it quotes data from the Mid-Year Update to the 2021 SonicWall Cyber Threat Report.

Newest Target of Cyber Attacks: America’s Hospitals — The Crime Report

  • Reporters here cited the Mid-Year Update to the 2021 SonicWall Cyber Threat Report as a reference point for the massive surge in ransomware attacks in the U.S. The story also noted a story from Arstechnica that describes how attackers knocked out staff access to I.T. systems across virtually all operations. The report also pointed out that the Ryuk cybercriminal gang was once called the “Business Club,” tied to Russian government security services.

Cyber threat warning to Fife businesses as attacks’ skyrocket’ — Dunfermline Press

CISA offers government and private sector guidance on ransomware prevention — FinTech Global

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) shared guidance on the roles government and private sector organizations may work together to prevent ransomware data breaches. The story cited the 151% spike in ransomware attacks that was reported in the Mid-Year Update to the 2021 SonicWall Cyber Threat Report.

SonicWall: Record 304.7 Million Ransomware Attacks Eclipse 2020 Global Total Just 6 Months — CRWE World

SonicWall: Record 304.7 Million Ransomware Attacks Eclipse 2020 Global Total in Just 6 Months — European Business Magazine

SonicWall: Record 304.7 Million Ransomware Attacks Eclipse 2020 Global Total in Just 6 Months — Digital Conqurer

SonicWall Cyber Threat Report 2021: 304.7 Million Record Ransomware Attacks In Just 6 Months, Eclipses Whole Of 2020 — SiliconVillage

SonicWall: Record 304.7 Million Ransomware Attacks Eclipse 2020 Global Total In Just 6 Months — MoneyFM

Ransomware was the most common attack among Brazilian companies in 2021 — Bahia Lighthouse

Ransomware was the most common attack among Brazilian companies in 2021 — InfoTec Computadores

Anniversary – 30 years of Sonicwall — Netzpalaver

  • The article notes SonicWall’s 30th anniversary to share its history, significant milestones, the growth of SonicWall technologies, and its commitment to its customers.

SonicWall turns 30: Cybersecurity pioneer celebrates three decades of innovation — All About SECURITY

  • This article also observes SonicWall’s 30th anniversary and shares comments from SonicWall President and CEO, Bill Conner, Exertis’ U.K. and Europe Security Sales Director, Jason Hill, Epicor’s I.T. Director of Hosting and Managed Services, Harry Hartnup, and SonicWall’s SVP and Chief Technology Officer, John Gmuender.

Sonicwall Turns 30: Cybersecurity Pioneer Celebrates Three Decades Of Innovation— SECURITY INSIDER

  • One more article celebrates SonicWall’s 30th anniversary, detailing SonicWall technologies and enduring customer loyalty.

Industry News

Crypto exchange Binance hires former U.S. Treasury criminal investigator — Reuters

  • Crypto exchange agency, Binance, says it appointed a former U.S. Treasury criminal investigator as its global money laundering reporting officer, part of an attempt by one of the world’s largest crypto exchanges to reinvent itself as a regulated financial firm.

China orders annual security reviews for all critical information infrastructure operators — The Register

  • China’s government has introduced rules for protection of critical information infrastructure. The announcement was issued the Cyberspace Administration of China (CAC) notes that security challenges facing critical information infrastructure are severe.

Japanese insurer Tokio Marine discloses ransomware attack — Bleeping Computer

  • Tokio Marine Holdings, a multinational insurance holding company in Japan, announced this week that its Singapore branch, Tokio Marine Insurance Singapore (TMiS), suffered a ransomware attack.

Diavol ransomware sample shows stronger connection to TrickBot gang — Bleeping Computer

  • A new analysis of a Diavol ransomware sample shows a more apparent connection between the gang behind the TrickBot botnet and the evolution of the malware.

BlackBerry’s popular operating system for medical devices affected by critical vulnerabilities — Cyberscoop

  • A critical set of software flaws first revealed in April affects code made by BlackBerry used in countless devices in the medical, automotive and energy sectors, the technology vendor confirmed on Tuesday. The disclosure expands the number of devices at risk due to the “BadAlloc” flaw.

Rural Sewage Plants Hit by Ransomware Attacks in Maine — Security Week

  • Local officials said that a pair of ransomware attacks on sewage treatment plants in rural Maine communities demonstrates that small towns need to be just as vigilant as larger communities in protecting against hackers.

Colonial Pipeline sends breach letters to more than 5,000 after ransomware group accessed SSNs — ZDNet

  • Colonial Pipeline is sending out notification letters to 5,810 current and former employees whose personal information was accessed by the DarkSide ransomware group  during an attack in May. The company admitted in an August 13 letter that on May 6, the ransomware group “acquired certain records” stored in their systems.

Malware campaign uses clever ‘captcha’ to bypass browser warning — Bleeping Computer

  • A malware campaign used a clever captcha prompt to trick users into bypassing browsers warnings to download the Gozi (aka Ursnif) banking trojan. Yesterday, security researcher Malware Hunter Team shared a suspicious URL with BleepingComputer that downloads a file when attempting to watch an embedded YouTube video about a New Jersey women’s prison.

Brazilian government discloses National Treasury ransomware attack — Bleeping Computer

  • The Brazilian Ministry of Economy disclosed a ransomware attack that hit the National Treasury’s computing systems on Friday night, right before the start of the weekend. “On Friday night (the 13th) a ransomware attack on the internal network of the National Treasury Secretariat was identified,” the Brazilian government announced.

Tech Hack Notification Delays Can Leave Corporate Customers in the Lurch — The Wall Street Journal

  • Some tech companies are slow to share details about hacks of their products, leaving customers vulnerable to disruptions and uncertain how to respond as information trickles out. Cyberattacks in which hackers target a service provider and then use that foothold to access their customers’ networks. The report goes on to describe how policy makers in the U.S. and Europe are scrutinizing “weak links.”

T-Mobile Investigating Claims of Massive Customer Data Breach — VICE

  • T-Mobile says it is investigating a forum post claiming to be selling a mountain of personal data. The forum post itself doesn’t mention T-Mobile, but the seller told Motherboard they have obtained data related to over 100 million people and that the data came from T-Mobile servers.

Dallas cops lost 8 T.B. of criminal case data during bungled migration, says the DA… four months later — The Register

  • According to local reports, a bungled data migration of a network drive caused the deletion of 22 terabytes of information from a U.S. police force’s system – including case files in a murder trial. Dallas Police Department confessed to the information blunder last week, revealing in a statement that a data migration exercise carried out at the end of the 2020-21 financial year deleted vast amounts of data from a network drive.

Surgeries canceled, care diverted as Memorial Health responds to cyberattack — S.C. Magazine

  • Memorial Health System in Ohio is currently operating under electronic health record (EHR) downtime procedures and diverting emergency care patients after a cyberattack struck its network during the early hours of Sunday, Aug. 15. All radiology exams and urgent surgical cases scheduled for Aug. 16 have also been canceled as a result.

In Case You Missed It

SonicWall: 30 Years of Partnering to Win

SonicWall has always been 100% channel-driven. Today, we’re honored to work with more than 17,000 channel partners worldwide — but even before SonicWall was known as SonicWall, we were working to build partnerships based on trust, loyalty and mutual success.

As early as the mid-1990s, SonicWall (then known as Sonic Systems) had already begun onboarding top resellers, value-added resellers (VARs) and systems integrators. By seeking out partner companies that focused on providing educational institutions and SMBs with high-quality, affordable inter-networking solutions, Sonic Systems was able to achieve tremendous growth in a short amount of time. This growth, in turn, fueled innovations that helped our partners and their customers continue to succeed.

SonicWall Launches Partner Recognition Programs

In recognition of these successful partnerships, in the late 1990s a newly rebranded ‘SonicWALL’ began developing a dedicated partner program. By 2000, this program had five distinct partner program levels — Reseller, Silver, Gold, Platinum and International Distributors — that would later become the foundation of today’s SecureFirst Partner Program.

The partner structure SonicWall currently employs dates back to 2004, when the Medallion Program was launched. This program was refreshed in 2007 to coincide with the launch of SonicWall’s first partner portal, PartnerLink.

In recognition of the unique needs of its Managed Security Services Provider partners, SonicWall announced its first MSSP program in 2005. This program was designed to help its channel partners grow their share of the managed services market and signaled a recognition of these partners that continues to the present day.

Partnering for a Successful Future: Today’s Programs

SonicWall’s partner programs have evolved a great deal since their inception, and today’s programs are more comprehensive and offer more benefits than ever before.

“At SonicWall, we listen,” said HoJin Kim, SonicWall SVP, Worldwide Channel, North American Sales. “We work incredibly hard to provide partners with everything they need in order to not only meet their yearly objectives, but exceed them.”

SecureFirst Partner Program

In 2016, SonicWall introduced the SecureFirst partner program. In the first 150 days, more than 10,000 partners registered to sell within the new program — 20% of which were new to SonicWall. Within a year, the program had grown 500% as partners around the world jumped at the opportunity to reintroduce SonicWall products to their comprehensive offerings.

The program’s ongoing success is due largely to its philosophy of partnering to win. In addition to the program’s goal of accelerating partners’ ability to be thought leaders in the ever-evolving cybersecurity landscape, it also offers a number of perks. These include competitive margins, deal registration protection, technical training, sales enablement, marketing and lead-generation support, and more.

In recognition of our commitment to going above and beyond for our solution providers, in 2021 the SonicWall SecureFirst partner program received a 5-star rating in the 2021 CRN Partner Program Guide. This annual guide provides a conclusive list of the most distinguished partner programs from leading technology companies that provide products and services through the IT channel.

SonicWall University

SonicWall University, an online partner enablement platform designed to keep SecureFirst partner sales representatives, pre-sales and support engineers at the forefront of both cyberthreats and security solutions, was unveiled in 2017. This free, on-demand online training portal offers pathways for partners to earn SecureFirst Sales and Technical Accreditations that directly influence increased revenue attainment.

SonicWall MSSP Program

In 2020, SonicWall’s MSSP program was modernized to empower MSSPs with the resources and tools they need to protect their customers while improving operational efficiency and costs. In addition to branding and customization options, the new MSSP structure empowers SecureFirst partners to consume SonicWall services on either a monthly or annual basis, matching the way they do business.

SonicWall relies on its expansive base to fuel its momentum and is dedicated to continuing to grow programs like these to further meet the needs of our partners in the future.

As SonicWall moves into its third decade, we’d like to take this opportunity to thank our partners for their loyalty and commitment. It is both our mission and our privilege to continue working toward our mutual success in the years to come.

Why SDP Matters in Zero Trust

Today’s networks have never been more diverse and distributed. While the network and security used to operate within a physical perimeter, digital transformation has made the old castle-and-moat model of security largely insufficient to protect modern networks. Organizations have hardened their network perimeters with firewalls, VPNs and NACs, but as the network perimeter continues to change, these tools need to evolve as well.

Traditionally, users were allowed to “connect first, authenticate later.” Network security relied on application-level permissions for authorization, giving users a pass into the network perimeter. But in today’s era of rising cybercrime, this implicit trust model puts organization at risk and has enabled far too many successful breaches.

Modern networks need flexible and adaptive security in which the perimeter begins with the users. The SDP (software-defined perimeter) model is built around the idea of “authenticate first, connect later,” giving administrators finely grained access control that is defined by policies and network parameters for each individual user.

SDP architectures include a minimum of five layers of security:

  • Authentication and validation of devices
  • Authentication and authorization of users
  • Two-way encrypted connections
  • Dynamic provisioning of connections
  • Mapping and control of connections to services, while keeping these connections hidden

SDP uses single-packet authorization (SPA) protocol, which validates user or device identity to ensure that network resources are only accessible by authorized users, on a need-to-know basis.

The SDP architecture is made up of three key components:

  • SDP Client: runs on the user’s device
  • SDP Controller: authentication gate keeper
  • SDP Gateway: trust broker to provide secure access to resources
  1. The SDP client makes an access request to the SDP controller. The controller evaluates credentials and authenticates the client as per the access policies.
  2. The SDP controller checks the context and passes the individual network entitlement to the SDP client, along with the signed token to access the authorized network resources.
  3. The SDP client provides network entitlement to the SDP gateway, and the gateway uses it to match applications with the user’s context.
  4. A dynamic network segment is created to the resource or service from the SDP client to the SDP gateway via encrypted tunnels.
  5. The end-to-end network segment is continuously monitored for any context changes.

In contrast with the traditional model, Zero Trust is a network security concept built around the idea that networks should trust nothing and verify everything. Implementing Zero Trust requires verification of anything that attempts to connect to your network, even before granting access, and continuous access validation for the duration of connection.

SDP is one of the best and most advanced ways to implement Zero Trust, as SDP is agnostic to underlying IP infrastructure while securing all network connections and the infrastructure itself. SDP architecture separates the control plane, where trust is established, from the data plane — thus providing least-privilege access to tightly defined micro-segments of the network and resources.

SDP is applied at the network layer before the transport layer and prior to the application of the session layer. A Zero Trust implementation using SDP enables organizations to defend new variations of attack vectors that are constantly surfacing in perimeter-centric networking models.

SonicWall Cloud Edge Secure Access enables a simple Network-as-a-Service (NaaS) for site-to-site and hybrid cloud connectivity to AWS, Azure, Google Cloud and more. By combining Zero-Trust, SDP and least-privilege security, the solution enables organizations to offer remote-work flexibility while still protecting high-value assets from costly security breaches.

It Started with Speed: Seven Generations of SonicWall Products

This month marks 30 years since SonicWall’s founding in 1991. To celebrate, we’ll be spending the month of August spotlighting the history, customers, products, partners and people that have helped shape SonicWall over the past three decades and will continue to inspire us in the years ahead.

If asked to name the first SonicWall appliance, many would say the TZ 170 or the original SOHO. But you’d need to go back at least five more years for the answer: the original SonicWall appliance wasn’t a firewall at all, and the original SonicWall wasn’t a firewall company.

In 1995, SonicWall (then called Sonic Systems) introduced its first internet appliance: the QuickStream/3. It was a three-port, multi-protocol remote access server offering remote users access to Apple’s incumbent AppleTalk, as well as then up-and-coming Ethernet technology.

But over the next year, two things happened: The market for Apple peripherals contracted, and Sonic Systems recognized a new opportunity — a lack of affordable firewalls for small- and medium-sized businesses (SMBs).

The SonicWALL Brings Speed, Strength and Security to SMBs

In October 1997, Sonic Systems released the Interpol, a secure, affordable and easy-to-manage NAT/firewall. It represented the first security appliance designed for SMBs, and was a huge hit.

A year later, in 1998, Sonic Systems changed the appliance’s name to the SonicWALL. The name was devised to evoke a combination of speed, strength and security, and was so well received that in 1999, the entire brand followed suit.

The following year, on the heels of a successful initial public offering (IPO), SonicWALL introduced two new appliances: the SOHO, designed for small businesses (the acronym stands for “Small Office, Home Office”) and the PRO, which delivered enterprise-class firewall throughput and VPN concentration to medium-sized businesses and branch offices.

Shortly after the turn of the millennium, SonicWALL introduced the Gen 2 product line, including the SOHO2 and the TELE2, an even more compact appliance for branches and telecommuters (it supported a grand total of five users.)

To help deal with the growing complexity of network security, SonicWALL also announced the Global Management System (GMS), which enabled the management of several SonicWALL appliances from a single place.

The SonicWall TZ 105

The TZ, the TELE3 and Other New Technology

The first Gen 3 appliances, including the SOHO3 and the TELE3, followed just a short year later, in 2001. This rapid advancement pace paid dividends — by 2002, the company had shipped its 250,000th unit — so SonicWALL kept it up. 2003 brought the introduction of Gen 4 products, including the first offering in the award-winning TZ Series: the TZ 170.

Another firewall series still going strong today made its debut in 2007: the NSA Series, designed for mid-sized organizations of 250 users and up. As part of the Gen 5 release, the company introduced the NSA E-5500, the NSA E-6500 and the NSA E-7500.

Displaying its commitment to continued innovation, SonicWALL was also granted its first patent that year: SWUS-001 – U.S. Patent No. 7,158,986.

The SonicWall NSA 220

Far Beyond Firewalls: SonicWall Transforms into a Cybersecurity Leader

The sale of SonicWALL’s 1 millionth unit kicked off the 2010s, and this decade would be marked by a massive uptick in innovation. In the years since its first patent was awarded, SonicWall employees have been granted more than 325 additional patents, many of these for advancements that would come to the fore in the latter half of the decade.

In 2016, SonicWALL — newly rebranded as SonicWall to coincide with a change in both ownership and leadership — released both its Gen 6 line of NGFWs, its largest to date, as well as SonicOS 6.0.

More big announcements would follow in 2018, both of which would further cement SonicWall as a leader in advanced threat protection. At that year’s RSA Conference, the company unveiled the SonicWall Capture Cloud Platform, which tightly integrates security, management, analytics and real-time threat intelligence across the company’s portfolio of security products.

Later that same year, SonicWall announced Real-Time Deep Memory Inspection (RTDMI™), a proprietary machine learning-based memory inspection technology included as part of the SonicWall Advanced Threat Protection (ATP) sandbox service.

In 2019, less than 10 years after its millionth unit was shipped, SonicWall celebrated the sale of its 3 millionth unit. Recognizing that the rapid growth of cybersecurity architectures was creating management complexities, SonicWall introduced the Capture Security Center, a single-pane-of-glass management solution designed to govern the entire range of SonicWall security operations and services.

A Boundless Future: Gen7 and Beyond

March 2020 ushered in the biggest change to the global workforce since the introduction of the PC. As the COVID-19 pandemic swept across the globe, SonicWall helped countless businesses rapidly make the switch to remote work, helping to ensure the survival of both employees and businesses in highly uncertain times.

While this shift was rapid, it was one SonicWall had long been preparing for. With the introduction of the Boundless Cybersecurity model in April 2020, the company cemented its commitment to closing the growing cybersecurity business gap created by a growth in the attack surface, a shortage of cybersecurity personnel and stagnant IT budgets. By allowing organizations to know the unknown, providing unified visibility and control, and employing disruptive economics, SonicWall has helped businesses weather both rapid shifts in the business world and unprecedented increases in cybercrime.

With the needs of today’s highly distributed, highly mobile workforce now fully at the forefront, SonicWall has recently embarked on the most ambitious refresh of its product portfolio in company history, introducing solutions that are already being widely recognized by third-party testing and reporting agencies.

SonicWall’s new Gen 7 next-generation firewall line, which delivers industry-leading performance, high port density and more, is powered by the newest version of SonicWall’s operating system. SonicOS 7 has been redeveloped from the ground up to be the more advanced, agile and user-friendly than any of its predecessors.

Today, SonicWall offers a full cybersecurity portfolio of products, including firewalls, wireless security, secure email, switches, SASE, secure remote and mobile access, endpoint protection, cloud security and more.

But despite three decades of growth, SonicWall has stayed true to the same vision championed by two brothers three decades ago: to make quality cybersecurity products accessible to businesses of all sizes, and to stand behind them.

SonicWall Celebrating Three Decades of Putting Customers First

This month marks 30 years since SonicWall’s founding in 1991. To celebrate, we’ll be spending the month of August spotlighting the history, customers, products, partners and people that have helped shape SonicWall over the past three decades and will continue to inspire us in the years ahead.

SonicWall has enjoyed tremendous growth over the past 30 years, but it hasn’t happened by accident. From the beginning, we’ve strived to keep the customer at the forefront of our business — a decision that has taken us from our roots as a small peripherals provider to the full-service cybersecurity leader we’ve become.

Even before the company released its first firewall, SonicWall (then called Sonic Systems) had dedicated itself to helping small- and medium-sized businesses (SMB) find more cost-effective ways to deploy, operate and protect their network. Despite the countless advancements, developments and changes that brought the company from that point to now, we’ve never wavered in our commitment to this mission.

We have expanded on it, however. Today, SonicWall serves more than 500,000 customers in more than 215 countries and territories, and among these are many of the world’s largest organizations, enterprises and government agencies.

There are many reasons customers choose SonicWall. Our product portfolio incorporates the newest threat-prevention technologies while continuing to offer an industry-leading TCO. Our Boundless Cybersecurity model offers a platform approach to cybersecurity, employing artificial intelligence and machine learning to help businesses bridge the cybersecurity business gap.  And our solutions continue to earn the approval of third-party testing agencies.

But one factor is cited again and again in their decision to stay with SonicWall: Our customer service. We strive to provide a variety of avenues for customers to address any question or issue, and take the feedback we receive on the resolution process seriously.

Because some customers don’t want to have to make a phone call to resolve a simple issue, we’ve modernized self-service options that have earned high ratings from users. SonicWall’s self-service score is a best-in-class 16:1, meaning that among those who choose to troubleshoot an issue on their own, the overwhelming majority are able to quickly and easily able to find a satisfactory resolution. And our knowledgebase, which is home to a wide assortment of technical documents and how-tos, has earned a 96% satisfaction rating.

But for more complex issues, we recognize that there’s often no substitute for speaking to a real person. SonicWall’s technical agents have earned an 86% satisfaction rating, and 56% of our support cases are resolved in the first business day — allowing our customers to more quickly resume business as usual.

We’ve seen similar positive responses via the Gartner Peer Insights portal. Despite the fact that the SonicWall Community has only been online for a little over a year, it’s already earning a 4.2 out of 5 from respondents. Respondents that have utilized technical support have been similarly satisfied, ranking that facet a 4.3 out of 5.

And, true to its name, SonicWall ranks high in timeliness of vendor response, earning a 4.4 out of 5 — the same score given to SonicWall’s service and support overall.

As a whole, SonicWall earns a 4.62 out of 5 rating — higher than the Gartner Peer Insights score for a majority of our competitors, and a testament to our continued commitment to customer service, before, during and after the sale.

We’d like to take this opportunity to thank each and every one of the customers who have chosen to put their trust in us. It’s been a privilege serving you over the past 30 years, and we hope to spend the next 30 years doing all we can to continue earning your loyalty and exceeding your expectations.

From Sonic Systems to SonicWall: 30 Years of Cybersecurity Evolution

This month marks 30 years since SonicWall’s founding in 1991. To celebrate, we’ll be spending the month of August spotlighting the history, people, products, partners and customers that have helped shape SonicWall over the past three decades and will continue to inspire us in the years ahead.

The SonicWall of today is internationally recognized as a leading cybersecurity company. But even among those in the industry, many aren’t aware that before there was SonicWall, there was a SonicWALL. But our story starts before even that — with two brothers in the Ethernet card business.

The Sonic Systems Years (1991-1995)

In the early 1990s, Sreekanth Ravi, who had previously owned a company that produced graphic expansion cards for Apple, saw an opportunity. The networking technology built into the Apple Macintosh product line at the time, LocalTalk, was very limited — and the Ethernet cards then available to expand these capabilities were prohibitively expensive.

Along with his brother, Sudhakar Ravi, he formed Sonic Systems (later to be called SonicWall) in 1991. The name Sonic Systems was chosen to evoke ideas of speed: the company was originally in the business of producing Ethernet cards to help transition the Apple Macintosh market from LocalTalk to the faster and more versatile Ethernet.

The new company’s first product, an Ethernet card for the NuBus and SE expansion slots, made its debut in the fall of 1991, and was so successful that by the following year, Apple OEMs were relying on Sonic Systems’ software to connect LocalTalk to Ethernet.

Building on these early wins, Sonic Systems soon expanded its product catalog to include Ethernet bridges, hubs, switches and more. But as Apple increasingly absorbed the functionality of these products into its systems, the market for aftermarket peripherals started to dry up. Sonic Systems diversified once again, shifting from peripherals to external appliances.

The Democratization of the Firewall (1996-1998)

But it wasn’t until 1996 that Sonic Systems began to consider branching out into firewalls. As the company grew, Sreehanth Ravi began looking for a firewall to safeguard Sonic Systems’ own internet connection. But to his dismay, he soon found that the firewalls available at the time, even the software-based ones, cost nearly $20,000. This was an enormous expense for a company that, at the time, had fewer than 40 employees and only minimal internet connectivity needs.

Once again sensing an opportunity, Sreekanth asked his brother to explore the feasibility of producing affordable NAT (Network Access Translation)/firewall appliances. That same year, the company released its final dedicated Macintosh offering, and its new mission became to provide firewall technology that was as affordable as it was effective.

In October 1997, Sonic Systems released the Interpol security appliance, which became a huge hit. But while the company’s focus on firewalls was permanent, the name Interpol was not: The following year, Sonic Systems rebranded the device as the “SonicWALL.”

Growth and Acquisition (1999-2015)

1999 brought many changes for Sonic Systems. Following in the footsteps of its most successful product, the company changed its own name to SonicWALL. That year also brought expansion into Europe and a successful initial public offering (IPO). SonicWALL executed a Secondary Public Offering, which raised additional funds, in March 2000.

This rapid advancement pace paid dividends — by 2002, the company had shipped its 250,000th unit — so SonicWALL kept it up. Recognizing that many SMBs wished to outsource their cybersecurity monitoring and management, SonicWALL introduced its Managed Security Services Provider program in 2005, kicking off a commitment to partnering with MSSPs that continues to this day.

Capping off a decade characterized by acquisitions — including enKoo, Aventail Corporation, Ignyte Technology, SecureCom and RedCreek — SonicWALL itself was acquired by Thoma Bravo in 2010, and again by Dell in 2012.

SonicWall Hits Its Stride (2016-Today)

2016 brought three important developments. That year, SonicWall was acquired by Francisco Partners, who rebranded the company as “SonicWall.” Cybersecurity and networking veteran Bill Conner was named SonicWall president and CEO, a position he has held ever since. And SonicWall’s SecureFirst partner program, designed to support, recognize and provide resources to SonicWall partners, also made its debut that year.

More big announcements would follow as the 2010s wound down, including the unveiling of the SonicWall Capture Cloud Platform, Real-Time Deep Memory Inspection (RTDMI™) technology, and Capture Security Center, all of which would further cement SonicWall as a leader in advanced threat protection.

These developments laid the groundwork for the arrival of SonicWall’s Boundless Cybersecurity platform in 2020. While the arrival of the COVID-19 pandemic elevated the need for secure remote work, SonicWall had long anticipated this shift and was ready to meet it head on.

As a result, the Boundless Cybersecurity platform, two years in the making, was primed to help businesses quickly and securely meet their business continuity needs in a work reality where everyone is remote, mobile and unsecure. Designed to close the cybersecurity gap created by an increase in attack surface and a shortage of cybersecurity personnel, the Boundless Cybersecurity model allows businesses to know the unknown, provides real-time visibility and enables breakthrough economics.

Today, SonicWall has brought the vision of Boundless Cybersecurity to more than 500,000 customers in 215 countries, and, on the heels of a two-year refresh of its product portfolio, the company is ideally suited to continue helping businesses of all sizes face the ever-changing threat landscape.

“While the last five years were important chapters in this journey, we have more goals to achieve, milestones to mark and history to be made,” SonicWall President and CEO Bill Conner said. “SonicWall is always forward-looking. And that’s how the company — and its people — have been a mainstay in the industry for more than 30 years.”

The Top 12 Cybersecurity Books – Recommendations from SonicWall Leadership and Employees

In celebration of National Book Lover’s Day, we polled SonicWall leadership and employees for the all-time standout cybersecurity books. Here’s what they recommend.

Cybercrime headlines have become a regular fixture in the daily news. As we connect to the internet for everything from work and school to social interactions, cybercriminals have taken advantage of a widening pool of potential targets.

According to the latest data in the Mid-Year Update to the 2021 SonicWall Cyber Threat Report, ransomware attacks were up 151% year to date through June 2021. In fact, SonicWall Capture Labs threat researchers recorded more ransomware attacks during the first half of 2021 than all over 2020.

As a result, cybersecurity has grown from a dedicated technology industry to a general interest topic. That’s why we’ve put together a list of cybersecurity books that everyone should — and can — read. From our employees’ responses, we’ve crafted a list of books that share wisdom gained from real-life experiences and threat research, all while providing a highly entertaining read.

  1. The Smartest Person in the Room
    2021, Christian Espinosa
    Christian Espinosa has poured his experience as an IT engineer and company CEO into this book with a fresh approach to cybersecurity. The book is detailed with business management insights and guidance for strategic planning. It is designed to help executives and managers solve the weakest link in cybersecurity: people. According to Espinosa, high intelligence and talent lose meaning when companies lack effective communication, intelligence and self-confidence, leaving organizations weak and vulnerable to exploitation. Espinosa outlines a seven-step methodology for turning a company’s greatest weakness into robust defense against the most common cyberthreats.
  2. Practical Cyber Security for Extremely Busy People
    2020, Daniel Farber Huang
    A guidebook written in concise, easily consumed sections designed to help individuals take actional steps to protect themselves, their families and their careers from cyber threats and online exploitation. Learn how to prevent companies from tracking your online movements, secure your online bank accounts and prevent identity theft. This book makes personal cybersecurity less intimidating and more efficient for any internet user.
  3. Cybersecurity and Cyberwar: What Everyone Needs to Know
    2014, P.W. Singer, Allan Friedman
    New York Times best-selling author P. W. Singer and renowned security expert Allan Friedman give us a simple and informative resource for deciphering our ongoing problems with cybersecurity. The narrative is wrapped around several essential questions: how cybersecurity works, why it matters and what we can do to help it along. The narrative is well-illustrated, with excellent stories and anecdotes that offer important and entertaining points about major players in cybersecurity.
  4. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
    2015, by Kim Zetter
    Kim Zetter is an investigative journalist who is well-known for her coverage of cybersecurity and national security issues. While this book is a bit older, it builds a case for the identity of the creator of Stuxnet and how the malware was used to sabotage Iran’s nuclear production infrastructure. In addition, the book illustrates how the malware went on to trigger a new age of warfare and threat. Finally, Zetter goes beyond the history of hacking attacks and makes several predictions about new threats we face.
  5. Social Engineering: The Science of Human Hacking
    2018, Christopher Hadnagy
    Written by Christopher Hadnagy, an IT educator and entrepreneur, Social Engineering illustrates how ‘social’ hackers think. Hadnagy points out that it’s much easier to trick someone into sharing their passwords than to exert the brute force necessary to hack into a system. This book examines social hackers’ psychological tactics and tricks to steal identities, commit fraud, and gain access to even the largest and most well-protected enterprise computer systems.
  6. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age
    2018, by David E. Sanger
    Written by New York Times national security correspondent David Sanger, The Perfect Weapon describes the confluence between cyberweapons and geopolitics. Sanger summarizes how hacking tools have transformed into cheap weapons utilized by democracies, despots, and terrorists alike and used virtually anonymously. Sanger reminds us that two American presidents — Bush and Obama — showed the world how it is done by launching the first massive state attack to destroy Iran’s nuclear centrifuges. Yet, ironically, America and its allies were badly unprepared when other state actors tuned the very same weapons against them. This book should be on everyone’s list because it illustrates “the perils of technological revolution, where everyone is a target.”
  7. Cult of the Dead Cow
    2019, Joseph Menn
    Author Joseph Menn describes his life as a teenage member of a hacker’s ‘club’ with a weird name. Menn explains the group’s genesis, how they worked, a few of their exploits, and how they became the country’s oldest and most respected ethical hacking group. According to Menn, the group coined the word “hacktivism” to force large corporations to rethink security protocols and protections for personal data. As of the book’s publication, the group and its followers are still engaged in hacktivism against misinformation and promoting security measures that help make personal data safer.
  8. Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
    2019, Andy Greenberg
    Author Andy Greenberg, a senior editor for WIRED magazine, writes a riveting narrative about a series of devastating cyberattacks that span three years (from 2014 to 2017) that started with utility companies in the U.S. and Europe and NATO administrative offices. The attacks resumed with a well-known deployment of malware known as NotPetya that paralyzed global corporations, railways, postal services, hospitals and did about $10 billion in damage. At the time, it was an unprecedented and the most destructive cyberattack the world had seen. Greenberg’s examination explores the realities of state-sponsored cyberattacks and still-relevant insights on the implications of a new type of global warfare.
  9. The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
    2019, by Richard A. Clarke, Robert K. Knake
    The Fifth Domain is written by two former U.S. presidential cybersecurity officials, Richard Clarke and Robert Knake. The authors open by listing the four known domains of warfare —land, air, sea, and space — adding the fifth domain: cyberspace. Next, they offer detailed profiles of several high-profile attacks and the lessons learned. Finally, the deeper dive gives us technical details about system resiliency that corporations and organizations can adopt to keep them out of trouble.
  10. Cyber Warfare – Truths, Tactics & Strategies
    2020, Dr. Chase Cunningham, foreword by Gregory J. Touhill
    This book clearly and plainly defines strategies and tactics for cybersecurity. Written by retired chief U.S. Navy cryptologist and cyber forensic analyst Dr. Chase Cunningham, the book is a quick read and easily digestible despite some of the high-level technical narratives. Readers gain an understanding of the tactics that threat adversaries use in the modern distributed IT world. Dr. Cunningham also dives into emerging cybersecurity issues such as machine learning, artificial intelligence, and deep fakes.
  11. Tribe of Hackers: Security Leaders
    2020, Marcus J. Carey and Jennifer Jin
    This volume is one of four books under the “Tribe of Hackers” title, written for people who want to work and succeed in the expanding field of information security. One of the series’ best editions, the book focuses on leadership training specifically for cybersecurity in a collection of essays written by non-corporate global thinkers from the field. Published by Wyle, a publisher that specializes in nonfiction business instructionals, this book and the companion series is a great way to kick off a career or grow an existing one.
  12. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
    2012, Kevin Mitnick
    Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escapes — and a portrait of a visionary who forced the authorities to rethink the way they pursued him, and forced companies to rethink the way they protect their most sensitive information.

Honorable Mention

It may not be a book about cybersecurity, but we cannot end this list without mentioning this upcoming release from Colonel Chris Hadfield.

Colonel Hadfield left a lasting impression on SonicWall employees globally when he kicked off the global Boundless 2020 virtual partner conference last August. Hadfield is set to release The Apollo Murders, a fictional account of three astronauts in a tiny spaceship, a quarter million miles from home, in October 2021. His debut thriller, The Apollo Murders is a high-stakes thriller unlike any other. Hadfield captures the fierce G-forces of launch, the frozen loneliness of space, and the fear of holding on to the outside of a spacecraft orbiting the Earth at 17,000 miles per hour as only someone who has experienced all of these things in real life can.

Cybersecurity News & Trends

This week, the tectonic Mid-Year Update to the 2021 SonicWall Cyber Threat Report continued to reverberate in the press, while SonicWall President and CEO Bill Conner finds himself selected for two CRN leadership lists. In other news, hackers hit Microsoft and diplomats, a Joint Cyber Defense Collaborative goes active, U.S. Senators’ “horror show,” the U.S. State Department (and other agencies) get low scores for cybersecurity, and Swisslog’s “Swiss cheese” problem.


SonicWall in the News

How remote work raises the risks of cyberattacks — Axios

  • SonicWall’s Mid-Year Update to the 2021 Cyber Threat Report continues to feature prominently in the press. Axios noted that as the pandemic drove more of the American workforce into remote offices, cyberattacks increased. The story cited stats from the report: Between 2019 and 2020, ransomware cyberattacks rose 62% worldwide and 158% in North America.

How remote work raises the risk of cyber and ransomware attacks— Yahoo! News

  • SonicWall’s Mid-Year Update to the 2021 Cyber Threat Report also appeared in Yahoo! News. The story highlighted the mention of stats from the FBI that observed a 20% rise in cyberattacks between 2019 and 2020. Also, from the report, the collective cost of ransomware attacks reported to the bureau rose more than 200% in 2020 to roughly $29.1 million.

The Challengers Power List— Forbes India

  • SonicWall’s own Debasish Mukherjee, VP of Regional Sales, APAC, was featured in a discussion about how businesses have faced pandemic challenges head-on and helped their companies grow. Mukherjee goes into detail on how SonicWall bridges cybersecurity gaps for enterprises, governments, and SMBs.

The Top 25 I.T. Innovators Of 2021— CRN

  • Bill Conner, President and CEO of SonicWall, was named to CRN’s Top 25 Innovators of 2021 list for his work evolving SonicWall beyond the firewall to deliver security for the endpoint, email and cloud. He also helped develop Cloud Edge Secure Access to allow customers to control and protect network access to managed and unmanaged devices based on identity, location and device parameters.”

The Top 100 Executives Of 2021— CRN

  • Bill Conner, President CEO of SonicWall, also found himself on CRN’s Top 100 Executives for 2021. CRN honors leaders who are setting the pace for the rest of the I.T. industry.

Industry News

Microsoft Exchange Used to Hack Diplomats Before 2021 Breach— Bloomberg

  • Late last year, while investigating the hack of an Italian retailer, researchers at the Los Angeles-based cybersecurity company Resecurity stumbled across five gigabytes of stolen data squirreled away on a cloud storage platform. During the previous three and half years, hackers stole the data from foreign ministries and energy companies by hacking their on-premises Microsoft Exchange servers.

U.S. Taps Amazon, Google, Microsoft, Others to Help Fight Ransomware, Cyber Threats— The Wall Street Journal

  • The U.S. launched the Joint Cyber Defense Collaborative and tapped Amazon, Google, Microsoft, and other companies to help combat ransomware and other cyberthreats. The creation of the joint initiative follows massive cyberattacks on critical U.S. infrastructure. “This will uniquely bring people together in peacetime so that we can plan for how we’re going to respond in wartime,” says Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency.

Senators highlight national security threats from China during rare public hearing— The Hill

  • The Senate Intelligence Committee held a rare public hearing earlier this week to stress the increased threats posed by mainland Chinese hackers to U.S. national security, U.S. companies, and intellectual property. One top senator described the situation as a “horror show.” According to the committee, the threats include Chinese cyberattacks against U.S. companies and critical organizations that resulted in the theft of billions of dollars in U.S. intellectual property.

A US official explains why the White House decided not to ban ransomware payments— The Hill

  • The Biden administration backed away from banning ransomware payments after meetings with the private sector and cybersecurity experts. According to reports, experts and business leaders helped shift that view following high-profile hacks against Colonial Pipeline, JBS, and Kaseya, a Florida-based IT firm.

New Hacking Group Shows Similarities to Gang That Attacked Colonial Pipeline— The Wall Street Journal

  • Cyberthreat investigators say that a new hacking group recently emerged with similar techniques used by a group that successfully hacked the Colonial Pipeline Co. earlier this year. The new group, named BlackMatter, has cryptocurrency wallets and ransomware strains similar to those used by the former group.

Ransomware Gangs and the Name Game Distraction — Krebs on Security

  • Brian Krebs takes a deep dive into notable ransom gang reinventions over the past five years. “Reinvention is a basic survival skill in the cybercrime business,” says Krebs. “Among the oldest tricks in the book is to fake one’s demise or retirement and invent a new identity.”

Energy group ERG reports minor disruptions after ransomware attack — Bleeping Computer

  • This week, ERG, an Italian energy company, reported that it experienced “only a few minor disruptions” to its information and communications technology infrastructure following a ransomware attack on its systems.

The State Department and 3 other U.S. agencies earn a D for cybersecurity — Ars Technica

  • Cybersecurity at eight federal agencies is so poor that four of them earned D grades, three got Cs, and only one received a B in a report issued Tuesday by a U.S. Senate Committee. This report comes two years after another damning cybersecurity report. Again, auditors find that little has improved.

Nearly 450K patients impacted by Orlando Family Physicians phishing attack— S.C. Magazine

  • Orlando Family Physicians (OFP) recently notified 447,426 patients that their data was potentially compromised during a successful phishing attack in April. The breach tally makes the OFP incident among the ten largest reported in U.S. health care this year.

Supply chain attacks are getting worse, and you are not ready for them— ZDNet

  • The European Union Agency for Cybersecurity (ENISA) analyzed 24% supply chain attacks and warned that current defenses against threats are insufficient. The ENISA report focused on advanced persistent threat (APT) supply chain attacks, noting that the coding was not very advanced, the planning and staging were complex.

White House cyber chief backs new federal bureau to track threats — The Hill

  • On Monday, National Cyber Director Chris Inglis made a case for establishing an office within the Department of Homeland Security (DHS) to track and analyze cybersecurity incidents to ensure that the country has an early warning system to understand attack vectors and targets.

FTC’s right-to-repair ruling is a small step for security researchers, giant leap for DIY hackers— Cyberscoop

  • The Federal Trade Commission recently voted unanimously to enforce rules against manufacturers who make it difficult for consumers to fix their own devices. Unfortunately, while a significant win for the “right-to-repair” movement for consumer advocates and owners of devices, this move is also a big win for hackers.

PwnedPiper vulns have potential to turn Swisslog’s PTS hospital products into “Swiss cheese,” says Armis — The Register

  • An investigation by security experts at Armis discovered severe vulnerabilities in Swisslog PTS hospital products used by 80% of U.S. hospitals. Security problems were so bad that analysts said that they had the potential to turn Swisslog’s products into “Swiss cheese.”  Among the vulnerabilities that were uncovered: hardcoded passwords, unencrypted connections, and unauthenticated firmware updates. Patches have been released.

In Case You Missed It