
Whitepapers
At BeyondTrust Labs, we think the best way to understand cybersecurity threats is to install them. Our team of cybersecurity intelligence experts, with decades of industry expertise, perform unique research designed to identify emerging threats, exploitation techniques, and the latest generation of cyber-attacks. We get hands-on with malware and fileless ransomware every day. By understanding ever-evolving attack chains, we are able to dissect the methods of threat actors to help organizations like yours defend against them.
Cybercriminals are relentless, and so are we. Our Labs team react to the latest cyber-attacks and identify causes, mitigation strategies and new attack pathways or strains of malware.
Since a lot of our reports are completed on an annual basis, our intelligence gathering generates holistic views of deveoping trends, easier analysis of anomolies, and credible long-term predictons.
To ensure the utmost relevance and accuracy, we conduct our own research, undertake field surveys, and forge collaborations with industry-leading publications to offer exclusive analysis.
The independent research conducted by our experienced BeyondTrust Labs team provides us with essential fuel to stay one step ahead of fast-moving attackers and ever-evolving threats.
Lessons from the Lab: An Expert Guide to Trickbot, DarkSide & Other Malware of 2021
Lessons from the Lab: An Expert Guide to Trickbot, DarkSide & Other Malware of 2021
Will DarkSide Pipeline Ransomware Attack Fuel Cybersecurity Upgrades for Critical Infrastructure?
Cyber Attack on Water Treatment Plant a Wake-Up Call to Harden Remote Access Security
James Maude is the Lead Cybersecurity Researcher at BeyondTrust. James has broad experience in security research, conducting in-depth analysis of malware and cyber threats to identify attack vectors and trends in the evolving security landscape. His background in forensic computing and active involvement in the security research community makes him an expert voice on cybersecurity. He regularly presents at international events and hosts webinars to discuss threats and defense strategies.
Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. He has more than 25 years of IT industry experience and has authored four Apress books: Privileged Attack Vectors (2 Editions), Asset Attack Vectors, and Identity Attack Vectors.
Chris has more than 15 years’ experience as a Senior Security and Architecture Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy, and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as a Senior Solutions Architect consulting on PAM implementations and reports to the Office of the CTO as an acting Deputy CTO.