The Summit of Cybersecurity Sits Among the Clouds

Credit to Author: Trend Micro| Date: Mon, 06 Jan 2020 17:38:33 +0000

Trend Micro Apex One™ as a Service You have heard it before, but it needs to be said again—threats are constantly evolving and getting sneakier, more malicious, and harder to find than ever before. It’s a hard job to stay one step ahead of the latest threats and scams organizations come across, but it’s something…

The post The Summit of Cybersecurity Sits Among the Clouds appeared first on .

Read more

3 Reasons MSPs Must Evolve Beyond Endpoint Detection and Response

Credit to Author: Trend Micro| Date: Mon, 18 Nov 2019 19:48:17 +0000

Endpoint protection is a critical component of a security strategy. But it’s not enough. Today’s threat landscape is so wide and varied, it requires round-the-clock monitoring, full visibility into IT environments and a multilayered approach to keep hackers at bay. For MSPs, this creates a sizable opportunity to protect clients with a comprehensive security strategy…

The post 3 Reasons MSPs Must Evolve Beyond Endpoint Detection and Response appeared first on .

Read more

XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Mon, 19 Aug 2019 13:22:58 +0000

Real enterprises are messy places. One messy reality is that enterprises don’t manage all their endpoints. A smart colleague turned me onto using the % of endpoints and servers managed as a prime security metric. On one end of the spectrum are places like universities that maybe manage 10% of the endpoints on their network….

The post XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR appeared first on .

Read more

Customer Perspective: Catching the thief lurking in the shadows with EDR and MDR

Credit to Author: Trend Micro| Date: Mon, 12 Aug 2019 15:17:00 +0000

A guest blog by Ian Loe, Senior Vice President, Cybersecurity, NTUC Enterprise Co-operative Limited News flash: aided by time, persistence and smarts, advanced cybersecurity felons are leapfrogging traditional security systems to compromise confidential data. Realising this, we at NTUC Enterprise have been looking into new security technologies that help address these rising concerns. One of…

The post Customer Perspective: Catching the thief lurking in the shadows with EDR and MDR appeared first on .

Read more

Why XDR Is A Big Deal, and Is Different from SIEM and Platforms

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Thu, 08 Aug 2019 14:30:36 +0000

In Jon Clay’s post, he does a great job of explaining the evolution from EDR to XDR. In short, he explained that Endpoint Detection and Response (EDR) is great, but that having sources of information beyond endpoint is better. The ‘X’ in XDR is essentially ‘many’ or whatever we can add to provide a broader,…

The post Why XDR Is A Big Deal, and Is Different from SIEM and Platforms appeared first on .

Read more

XDR Needs Network Data and Here’s Why

Credit to Author: Jon Clay (Global Threat Communications)| Date: Wed, 07 Aug 2019 15:56:40 +0000

As we’ve discussed in previous blogs, XDR is a better way to detect attacks within a network since it is able to coordinate and collaborate threat intelligence and data across multiple threat vectors, including endpoint (including mobile and IIoT), server, network, messaging, web, and cloud. In this blog I want to discuss an area of…

The post XDR Needs Network Data and Here’s Why appeared first on .

Read more

Will XDR Improve Security?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Mon, 29 Jul 2019 14:06:36 +0000

Cybercriminals and malicious hackers have been shifting their tactics, techniques, and procedures (TTPs) to improve their ability to infiltrate an organization and stay under the radar of security professionals and solutions. Moving to more targeted attack methods appears to be a mainstay among threat actors, which requires organizations to improve their visibility into the entire…

The post Will XDR Improve Security? appeared first on .

Read more

This Week in Security News: Macs, Hacks and Attacks

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 22 Jun 2018 13:30:33 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, GitHub was hacked via their official account with cryptocurrency Sycoin. Also, a phishing attack targeting trustee company HealthEquity led to the release of 23,000 Subscribers’ PHI. Read…

The post This Week in Security News: Macs, Hacks and Attacks appeared first on .

Read more