Month: April 2018

MalwareBytesSecurity

5 cybersecurity questions retailers must ask to protect their businesses

Credit to Author: Jovi Umawing| Date: Tue, 17 Apr 2018 15:00:00 +0000

If retailers think they already have much to worry about, they have another thing coming— cybersecurity—and it’s no longer something they can keep on the back burner. This piece helps retailers ask the right cybersecurity questions to protect their businesses.

Categories:

Tags:

(Read more…)

The post 5 cybersecurity questions retailers must ask to protect their businesses appeared first on Malwarebytes Labs.

Read More
MicrosoftSecurity

Connect to the Intelligent Security Graph using a new API

Credit to Author: Microsoft Secure Blog Staff| Date: Tue, 17 Apr 2018 14:00:18 +0000

Most organizations deal with high volumes of security data and have dozens of security solutions in their enterprise, making the task of integrating various products and services daunting and complex. The cost, time, and resources necessary to connect systems, enable correlation of alerts, and provide access to contextual data is extremely high. These challenges hinder

Read more

Read More
SecurityTrendMicro

The Cybersecurity Tech Accord: Time to Come Together to Combat Digital Threats

Credit to Author: Trend Micro| Date: Tue, 17 Apr 2018 11:12:50 +0000

At Trend Micro we’re committed to making the world a safer place in which to exchange digital information. In fact, we’ve been protecting our customers from the ever-evolving threat landscape for nearly 30 years. But we know we can and must do more as an industry to combat the challenges we face today. That’s why…

The post The Cybersecurity Tech Accord: Time to Come Together to Combat Digital Threats appeared first on .

Read More
SecurityTrendMicro

Arm your users with knowledge to spot phishing attacks – for free!

Credit to Author: Chris Taylor| Date: Tue, 17 Apr 2018 11:05:50 +0000

Attendees to the Black Hat 2017 security conference said their #1 security concern and most time-consuming activity was phishing and social engineering attacks. That’s no surprise with the increase in Business Email Compromise (BEC) attacks and with most ransomware being delivered by email. But Black Hat Attendees also said the weakest link in their security…

The post Arm your users with knowledge to spot phishing attacks – for free! appeared first on .

Read More
SecurityTrendMicro

Leveraging the Power of AI to Stop Email Scammers

Credit to Author: Chris Taylor| Date: Mon, 16 Apr 2018 12:00:58 +0000

Staff members are on the frontline when it comes to cyberattacks against their employers. They’re increasingly seen by hackers as a weak link in the cybersecurity chain. That’s why most threats today come via email, aimed squarely at tricking the recipient into downloading malware, divulging log-ins or making wire transfers to the attacker. We predict…

The post Leveraging the Power of AI to Stop Email Scammers appeared first on .

Read More
SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 9, 2018

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 13 Apr 2018 15:37:14 +0000

The interviewing process can be mentally draining. You have to look your best, say the right things, and prove that you’re the best person for the job. When I interview candidates, I love to come up with the one crazy question that isn’t on the usual list of questions that might be asked. I probably…

The post TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 9, 2018 appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Corporate Vulnerability and Cyber Threats

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 13 Apr 2018 13:00:22 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, a new cyber threat report reveals the vulnerability of small businesses and a new ransomware could infect your software to steal your passwords. Read on to learn…

The post This Week in Security News: Corporate Vulnerability and Cyber Threats appeared first on .

Read More