Security

SecurityTrendMicro

Is chat putting your business at risk?

Credit to Author: Trend Micro| Date: Thu, 26 Jul 2018 15:30:37 +0000

Now that corporate activities are increasingly taking place outside of the office, technology that enables real-time communication and collaboration among office workers and telecommuters is absolutely essential. Elements like file sharing, video conferencing and cloud access have quickly become imperative. However, few solutions address the challenges that can come up with geographically dispersed workers like…

The post Is chat putting your business at risk? appeared first on .

Read More
MicrosoftSecurity

Attack inception: Compromised supply chain within a supply chain poses new risks

Credit to Author: Windows Defender ATP| Date: Thu, 26 Jul 2018 13:00:13 +0000

A new software supply chain attack unearthed by Windows Defender Advanced Threat Protection (Windows Defender ATP) emerged as an unusual multi-tier case. Unknown attackers compromised the shared infrastructure in place between the vendor of a PDF editor application and one of its software vendor partners, making the apps legitimate installer the unsuspecting carrier of a

Read more

Read More
SecurityTrendMicro

Our Extensive Survey on IoT Cybersecurity Has Remarkable Top Consequence

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Thu, 26 Jul 2018 12:16:18 +0000

Trend Micro recently conducted a global survey of IT and security decision makers. When asked about the top consequence to IoT security, many would have expected it to be data loss. However, the top consequence named with 52% of respondents was “Loss of Customer Trust.” IoT has a physical component that is unusual in the…

The post Our Extensive Survey on IoT Cybersecurity Has Remarkable Top Consequence appeared first on .

Read More
SecurityTrendMicro

Preparing for Shadow OT: A Hospital Case Study

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Wed, 25 Jul 2018 17:09:51 +0000

The convergence of IT and OT is happening more rapidly than IT expects. Once upon a time, IT was so expensive that enterprises built entire departments to prioritize spending and efficiently manage those costly investments. Now, IT is so inexpensive that any individual who wants IT can buy it (or rent it). This is “Shadow…

The post Preparing for Shadow OT: A Hospital Case Study appeared first on .

Read More