This Week in Security News: DevOps Implementation Concerns and Malware Variants

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 23 Aug 2019 14:01:24 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how most respondents to a Trend Micro survey shared their concern for the risks in implementing DevOps. Also, read on about how Trend Micro uncovered…

The post This Week in Security News: DevOps Implementation Concerns and Malware Variants appeared first on .

Read more

Trend Micro Named A Leader in 2019 Gartner Magic Quadrant for Endpoint Protection Platforms

Credit to Author: Wendy Moore| Date: Fri, 23 Aug 2019 16:29:43 +0000

Leadership. It’s a weighty term, although frequently it is used too lightly and all too often it’s a self-declared position. We believe, leaders can come and go, and leadership can be fleeting depending on the factors for long term success. It is for all these reasons, that we are proud, not only to be in…

The post Trend Micro Named A Leader in 2019 Gartner Magic Quadrant for Endpoint Protection Platforms appeared first on .

Read more

The Sky Has Already Fallen (you just haven’t seen the alert yet)

Credit to Author: Rik Ferguson (VP, Security Research)| Date: Wed, 21 Aug 2019 14:50:09 +0000

Of course, the much-touted “Cybersecurity Skills Shortage” isn’t news to anyone, or it shouldn’t be. For seven or more years, journalists, industry analysts and practitioners have been opining about it one way or another. Analyses and opinions vary on how we have reached this impasse, my own being that this is a largely self-inflicted crisis…

The post The Sky Has Already Fallen (you just haven’t seen the alert yet) appeared first on .

Read more

FAKE APPS!—courtesy of Agent Smith

Credit to Author: Trend Micro| Date: Wed, 21 Aug 2019 14:05:06 +0000

As new mobile malware sweeps the globe, here’s how to keep your device secure. We’re spending more and more of our lives online and for most of us the door to this digital world is our smartphone. It’s the first thing we look at when we wake up and the last thing we check at…

The post FAKE APPS!—courtesy of Agent Smith appeared first on .

Read more

How Do Threats Align With Detection And Solutions?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Mon, 19 Aug 2019 14:05:16 +0000

There are many different threats targeting many different areas of a corporate network. Have you ever wondered how those threats are stopped? What threats impact which areas of a network? What technology detects and blocks those threats? I wanted to build an interactive graphic to answer those questions. This interactive infographic can help you understand…

The post How Do Threats Align With Detection And Solutions? appeared first on .

Read more

XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Mon, 19 Aug 2019 13:22:58 +0000

Real enterprises are messy places. One messy reality is that enterprises don’t manage all their endpoints. A smart colleague turned me onto using the % of endpoints and servers managed as a prime security metric. On one end of the spectrum are places like universities that maybe manage 10% of the endpoints on their network….

The post XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR appeared first on .

Read more

Innovate or Die?

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Fri, 16 Aug 2019 15:13:14 +0000

The recent series of IT acquisitions and IPOs highlight a simple economic fact: companies that fail to keep up with the fast-paced innovation of technology can easily become targets for acquisition. Mark Twain put it this way: History doesn’t repeat itself, but it rhymes. As a former Gartner analyst, I find it irresistible to comment…

The post Innovate or Die? appeared first on .

Read more

This Week in Security News: Phishing Campaigns and a Biometric Data Breach

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 16 Aug 2019 14:05:21 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about ever-increasing amounts of phishing campaigns and how Trend Micro caught 2.4 million attacks of this type — a 59% increase from 1.5 million in the…

The post This Week in Security News: Phishing Campaigns and a Biometric Data Breach appeared first on .

Read more

Customer Perspective: Catching the thief lurking in the shadows with EDR and MDR

Credit to Author: Trend Micro| Date: Mon, 12 Aug 2019 15:17:00 +0000

A guest blog by Ian Loe, Senior Vice President, Cybersecurity, NTUC Enterprise Co-operative Limited News flash: aided by time, persistence and smarts, advanced cybersecurity felons are leapfrogging traditional security systems to compromise confidential data. Realising this, we at NTUC Enterprise have been looking into new security technologies that help address these rising concerns. One of…

The post Customer Perspective: Catching the thief lurking in the shadows with EDR and MDR appeared first on .

Read more

Cyberattack Lateral Movement Explained

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Mon, 12 Aug 2019 15:11:56 +0000

[Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement. And the reason why I want to tackle this today is because I’ve had some conversations in the last few days that have really kind of hit that…

The post Cyberattack Lateral Movement Explained appeared first on .

Read more

Why XDR Is A Big Deal, and Is Different from SIEM and Platforms

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Thu, 08 Aug 2019 14:30:36 +0000

In Jon Clay’s post, he does a great job of explaining the evolution from EDR to XDR. In short, he explained that Endpoint Detection and Response (EDR) is great, but that having sources of information beyond endpoint is better. The ‘X’ in XDR is essentially ‘many’ or whatever we can add to provide a broader,…

The post Why XDR Is A Big Deal, and Is Different from SIEM and Platforms appeared first on .

Read more