RSAC 2024: Sophos Checks in with the State of Ransomware 2024

John Shier, Field CTO Commercial at Sophos, joins Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss findings of the company’s fifth annual state of ransomware report.

10 Min View
Source: Informa Tech

John Shier, Field CTO Commercial at Sophos, joins Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss findings of the company’s fifth annual state of ransomware report, tracking new methods and techniques its purveyors are using, as well as how weary ransomware victims are pushing back. Shier reports that ransom demands have increased while the overall rate of ransomware attacks is declining. He also reveals that attackers are starting to target victims’ backup data more and more, and offers some advice on how organizations can better protect themselves against this costly form of malware.

John Shier is a Field CTO Commercial at Sophos with more than two decades of cybersecurity experience. He’s passionate about protecting consumers and organizations from advanced threats, and has researched everything from costly ransomware to illicit dark web activity, uncovering insights needed to strengthen proactive cybersecurity defenses. John is often consulted by press, and has been quoted in publications like Reuters, WIRED, Fortune, CNN, The Hill, Fast Co, Yahoo, and more. He’s also a frequent speaker at industry events like RSA Conference, Infosec, Cebit, Gitex, and more.

About the Author

Terry Sweeney, Contributing Editor

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, Network World, InformationWeek and Mobile Sports Report.

In addition to information security, Sweeney has written extensively about cloud computing, wireless technologies, storage networking, and analytics. After watching successive waves of technological advancement, he still prefers to chronicle the actual application of these breakthroughs by businesses and public sector organizations.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights