167: Threatlocker - Darknet Diaries - Audio Brevity | Audio Brevity
167: Threatlocker
Darknet Diaries

167: Threatlocker

Dec 23, 2025 49m
AI Summary Available

Get the full experience! Sign up to access transcripts, personalized summaries, and more features.

Episode Description

A manufacturer gets hit with ransomware. A hospital too. Learn how Threatlocker stops these types of attacks. This episode is brought to you by Threatlocker.

Sponsors

This episode is sponsored by ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

Listen to Episode

AI-Generated Summary

Ransomware Encounter: A True Story

The episode provides a gripping account of an IT Operations Head managing a large manufacturing company who faced a devastating ransomware attack by 'Conti.' This attack, which spread swiftly across 250 servers and numerous endpoints, saw the entire business brought to a standstill. The speaker, reflecting on that fateful day, details the chaos that ensued, the lack of established protocols, and the emotional toll it took on him and his team. This story sets the stage for discussing the importance of understanding cybersecurity defenses.

The Importance of Protocols and Preparedness

Through personal experience, the speaker emphasizes how critical it is for organizations to have established protocols in place for cyber incidents. They discuss how, five years ago, they lacked a roadmap for responding to ransomware threats, which contributed to the attack's severity. It stresses the need for continuous improvement and training in the field of IT security, urging listeners to understand the necessity of being prepared for such attacks.

Introducing ThreatLocker: A Revolutionary Solution

The episode highlights the features of ThreatLocker, focusing on its Zero Trust approach which stops all applications by default, allowing only those explicitly permitted. This strategy not only prevents ransomware attacks but also secures businesses from unknown threats. Details of how ThreatLocker was implemented in both the speaker's manufacturing organization and a hospital's network illustrate its significance in stopping potential threats and maintaining operational security.

Real-World Impacts and Lessons Learned from Attacks

Finally, the podcast provides real-world examples, including an account from a cybersecurity engineer who defended a hospital against a ransomware attack using ThreatLocker. Despite the hospital's lack of multi-factor authentication (MFA), the application control provided by ThreatLocker mitigated much of the threat. This discussion underscores the ongoing risks organizations face in today’s cyber landscape, while reinforcing the effectiveness of adopting a proactive security posture.

Ready to get started?

Join other podcast enthusiasts who are getting podcast summaries.

Sign Up Free