TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 16, 2018

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 20 Apr 2018 14:45:13 +0000

It was a crazy week at this year’s RSA Conference in San Francisco. I always try to get a quick view of the floor to see companies old and new exhibit their wares. Unfortunately, work never sleeps when you attend a conference, and the shortage of seating at this year’s event left many, including myself,…

The post TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 16, 2018 appeared first on .

Read more

This Week in Security News: Warnings and WannaCry

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 20 Apr 2018 14:27:01 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, we’re following Ikea’s job marketplace, TaskRabbit, which may have suffered a data breach. Also, the U.S and U.K warn against Russian cyber attacks for individual homes and…

The post This Week in Security News: Warnings and WannaCry appeared first on .

Read more

Endpoint Security Testing Matters: New NSS AEP Test Results

Credit to Author: Eric Skinner| Date: Wed, 18 Apr 2018 17:05:19 +0000

NSS Labs, Inc. has just released the 2018 edition of their Advanced Endpoint Protection testing, and Trend Micro’s endpoint solutions have performed very well, resulting in a “recommended” rating. We had strong performance on “security effectiveness,” meaning that we detected and blocked threats effectively. We also had a low total cost of ownership relative to…

The post Endpoint Security Testing Matters: New NSS AEP Test Results appeared first on .

Read more

The Human (Resource) Role in the Journey to GDPR Compliance

Credit to Author: Steve Neville| Date: Wed, 18 Apr 2018 16:02:15 +0000

Employees are at the center of dealing with the General Data Protection Regulation (GDPR), which is the new European regulation that aims to strengthen and standardize the data pricy rights of European citizens. As we’ve discussed throughout this blog series, the GDPR impacts many organizations processing customer data from outside of the EU, but these…

The post The Human (Resource) Role in the Journey to GDPR Compliance appeared first on .

Read more

The connected workforce: The importance of protecting home and corporate networks

Credit to Author: Trend Micro| Date: Wed, 18 Apr 2018 01:19:52 +0000

In an age when data breaches are occurring increasingly frequently, it’s critical that chief information security officers and other IT admins don’t disregard the risk employees’ at-home activities can pose to their business security posture.

In an age when data breaches are occurring increasingly frequently, it’s critical that chief information security officers and other IT admins don’t disregard the risk employees’ at-home activities can pose to their business security posture.

The post The connected workforce: The importance of protecting home and corporate networks appeared first on .

Read more

The Cybersecurity Tech Accord: Time to Come Together to Combat Digital Threats

Credit to Author: Trend Micro| Date: Tue, 17 Apr 2018 11:12:50 +0000

At Trend Micro we’re committed to making the world a safer place in which to exchange digital information. In fact, we’ve been protecting our customers from the ever-evolving threat landscape for nearly 30 years. But we know we can and must do more as an industry to combat the challenges we face today. That’s why…

The post The Cybersecurity Tech Accord: Time to Come Together to Combat Digital Threats appeared first on .

Read more

Arm your users with knowledge to spot phishing attacks – for free!

Credit to Author: Chris Taylor| Date: Tue, 17 Apr 2018 11:05:50 +0000

Attendees to the Black Hat 2017 security conference said their #1 security concern and most time-consuming activity was phishing and social engineering attacks. That’s no surprise with the increase in Business Email Compromise (BEC) attacks and with most ransomware being delivered by email. But Black Hat Attendees also said the weakest link in their security…

The post Arm your users with knowledge to spot phishing attacks – for free! appeared first on .

Read more

Leveraging the Power of AI to Stop Email Scammers

Credit to Author: Chris Taylor| Date: Mon, 16 Apr 2018 12:00:58 +0000

Staff members are on the frontline when it comes to cyberattacks against their employers. They’re increasingly seen by hackers as a weak link in the cybersecurity chain. That’s why most threats today come via email, aimed squarely at tricking the recipient into downloading malware, divulging log-ins or making wire transfers to the attacker. We predict…

The post Leveraging the Power of AI to Stop Email Scammers appeared first on .

Read more

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 9, 2018

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 13 Apr 2018 15:37:14 +0000

The interviewing process can be mentally draining. You have to look your best, say the right things, and prove that you’re the best person for the job. When I interview candidates, I love to come up with the one crazy question that isn’t on the usual list of questions that might be asked. I probably…

The post TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 9, 2018 appeared first on .

Read more

This Week in Security News: Corporate Vulnerability and Cyber Threats

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 13 Apr 2018 13:00:22 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, a new cyber threat report reveals the vulnerability of small businesses and a new ransomware could infect your software to steal your passwords. Read on to learn…

The post This Week in Security News: Corporate Vulnerability and Cyber Threats appeared first on .

Read more