Business

SecurityTrendMicro

Protecting Critical Infrastructure from Cyber Threats

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Tue, 31 Oct 2017 14:30:57 +0000

This last week of National Cyber Security Awareness Month (NCSAM), we focus on critical infrastructure (CI). For many years now we have discussed and seen the result of poorly designed and protected control system networks. I wrote on this very topic back in 2016. Now the threat landscape has evolved further and the attack surface…

Read More
MalwareBytesSecurity

How to create an intentional culture of security

Credit to Author: Malwarebytes Labs| Date: Thu, 19 Oct 2017 18:00:48 +0000

A culture of security in the workplace has always existed; it just may be unrecognized, weak, or inconsistent. How can businesses get employees to accept and champion an intentional culture of security? And why should they? We’ll show you how.

Categories:

Tags:

(Read more…)

The post How to create an intentional culture of security appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

Trend Micro Top Again for Breach Detection, Says NSS Labs

Credit to Author: TJ Alldridge| Date: Thu, 19 Oct 2017 15:13:08 +0000

In spite of a rapidly evolving landscape, data breaches remain among the most common and damaging cyber-threats facing organizations today. As digital transformation efforts take hold, so the corporate attacks surface grows, offering more opportunities for the bad guys to take aim at highly prized IP and customer data. They also have the element of…

Read More
MalwareBytesSecurity

Phishes, pseudophishes, and bad email

Credit to Author: William Tsing| Date: Mon, 16 Oct 2017 18:00:49 +0000

Everyone knows about phishing. But what about pseudophishing? When companies use poor design, no attribution, and broad requests for personal info, their legit emails look like a phish.

Categories:

Tags:

(Read more…)

The post Phishes, pseudophishes, and bad email appeared first on Malwarebytes Labs.

Read More