How Do Threats Align With Detection And Solutions?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Mon, 19 Aug 2019 14:05:16 +0000

There are many different threats targeting many different areas of a corporate network. Have you ever wondered how those threats are stopped? What threats impact which areas of a network? What technology detects and blocks those threats? I wanted to build an interactive graphic to answer those questions. This interactive infographic can help you understand…

The post How Do Threats Align With Detection And Solutions? appeared first on .

Read more

Customer Perspective: Catching the thief lurking in the shadows with EDR and MDR

Credit to Author: Trend Micro| Date: Mon, 12 Aug 2019 15:17:00 +0000

A guest blog by Ian Loe, Senior Vice President, Cybersecurity, NTUC Enterprise Co-operative Limited News flash: aided by time, persistence and smarts, advanced cybersecurity felons are leapfrogging traditional security systems to compromise confidential data. Realising this, we at NTUC Enterprise have been looking into new security technologies that help address these rising concerns. One of…

The post Customer Perspective: Catching the thief lurking in the shadows with EDR and MDR appeared first on .

Read more

The BEC List: Helping Thwart Business Email Compromise through Collaboration

Credit to Author: Trend Micro| Date: Thu, 11 Oct 2018 19:30:01 +0000

Today, the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) gave the JD Falk Award to the Business Email Compromise (BEC) List. The BEC List comprises cybersecurity firms, researchers and internet infrastructure companies that help deal with cybercriminal activities and schemes. The JD Falk Award is given to individuals or groups whose meritorious work has…

The post The BEC List: Helping Thwart Business Email Compromise through Collaboration appeared first on .

Read more

Uber: How Not To Handle A Breach

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 22 Nov 2017 17:18:01 +0000

Uber is a company that is embattled on all fronts. From a very public power struggle to labour issues to regulatory challenges to a reportedly toxic culture, Uber sits in a precarious position. Yesterday, a new strike against the company came to light. In October 2016, Uber was hacked resulting in the exposure of 57…

Read more

Cybersecurity Wants You!

Credit to Author: William “Bill” Malik| Date: Mon, 07 Aug 2017 13:00:48 +0000

At Black Hat in Las Vegas last week, Trend Micro’s Kevin Simzer spoke about the global, dire need for cybersecurity talent. The number of open jobs in cybersecurity continues to increase dramatically. A report from Cisco stated that there were over one million unfilled positions globally in 2016. Symantec’s CEO said the shortfall will rise…

Read more