Security

SecurityTrendMicro

Protecting against the next wave of advanced threats targeting Office 365 – Trend Micro Cloud App Security 2018 detection results and customer examples

Credit to Author: Joyce Huang| Date: Thu, 28 Feb 2019 16:31:06 +0000

Since the release of “Trend Micro Cloud App Security 2017 Report” about a year ago, threats using email as the delivery vector have grown significantly. Business Email Compromise (BEC) scams have already caused USD $12.5 billion in global losses as of 2018 – a 136.4% increase from the $5.3 billion reported in 2017. The popularity…

The post Protecting against the next wave of advanced threats targeting Office 365 – Trend Micro Cloud App Security 2018 detection results and customer examples appeared first on .

Read More
MalwareBytesSecurity

Key considerations for building vs. buying identity access management solutions

Credit to Author: Kayla Matthews| Date: Thu, 28 Feb 2019 16:00:00 +0000

Having a strong identity and access management solution is critical to the security of your organization. It ensures that the right people have access to your system—and keeps unauthorized users out. Should businesses build these solutions in-house or look to third-party vendors to fill the gap? Here are the factors to consider.

Categories:

Tags:

(Read more…)

The post Key considerations for building vs. buying identity access management solutions appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

Insecure VPNs: Top risks and symptoms that stronger security is needed

Credit to Author: Trend Micro| Date: Thu, 28 Feb 2019 15:00:21 +0000

Virtual private networks, or VPNs, were created to provide a secure tunnel in which user activity can be carried out in privacy. In this way, VPNs have been utilized by individual users, as well as to support business processes for several years, and their use is only growing. According to current statistics, nearly 25 percent…

The post Insecure VPNs: Top risks and symptoms that stronger security is needed appeared first on .

Read More