{"id":14778,"date":"2019-03-07T08:00:04","date_gmt":"2019-03-07T16:00:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/03\/07\/news-8527\/"},"modified":"2019-03-07T08:00:04","modified_gmt":"2019-03-07T16:00:04","slug":"news-8527","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/03\/07\/news-8527\/","title":{"rendered":"Beauty Out of Chaos: Elevating Cybersecurity to an Art Form \u2013 Part 2"},"content":{"rendered":"<p><strong>Credit to Author: Leah MacMillan| Date: Thu, 07 Mar 2019 15:00:23 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"157\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1-300x157.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1-300x157.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1-768x401.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1-1024x535.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1-640x334.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1-900x470.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1-440x230.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1-380x199.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1.jpg 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Art and cybersecurity are not two worlds usually seen sharing the same orbit. But at Trend Micro we believe there\u2019s a vision, a mastery of skill and a passion which unites both. It\u2019s an approach we\u2019ve spent the past three decades honing as serious barriers have emerged to challenge IT efforts to support the business.<\/p>\n<p>This enables us to provide the solutions and information IT teams need to give businesses the confidence to drive digital innovation and growth.<\/p>\n<p><strong>Sleepless nights for CISOs<\/strong><\/p>\n<p>As I explained in part one of this two-part series, we live today in a chaotic world where IT teams must tackle an increasingly agile and determined enemy whilst handicapped by growing technological complexity. As infrastructure has evolved, and connectivity and mobility have grown, the corporate attack surface has expanded, creating multiple points of weakness for hackers to target. But it isn\u2019t just the hackers that are keeping IT security bosses awake at night.<\/p>\n<p>They must also consider challenges such as:<\/p>\n<p><strong>A growing compliance burden: <\/strong>The GDPR was a global game-changer when it came into force on May 25, 2018, even though it\u2019s a European regulation. It brought with it a new focus on consumers and data privacy overall, granting them new powers over their personal data and forcing the organizations that handle it to be more transparent and accountable in how they do so. Crucially, maximum fines of 4% of global annual turnover or \u20ac20m ($23m), whichever is higher, for a breach and an additional 2% fine or \u20ac10m ($11.5m) for reporting non-compliance have finally got the attention of boards. The GDPR \u00a0raised the bar globally and may be followed eventually be similar legislation in the US. But it\u2019s also put pressure on CISOs already saddled with a complex patchwork of regulatory compliance mandates across multiple regions.<\/p>\n<p><strong>Chronic skills shortages: <\/strong>While the bad guys only have to get lucky once, those white hats tasked with stopping them have an altogether harder job trying to predict where attacks may come and mitigate risk effectively. This is made even more challenging by the fact that many organizations are struggling to recruit enough skilled security professionals. <a href=\"https:\/\/www.isc2.org\/Research\/Workforce-Study\">An estimated global shortage<\/a> of nearly three million industry workers today includes almost 500,000 in North America, and it\u2019s growing all the time. Automation and AI can help cover some of the cracks, but these tools can\u2019t address the underlying problem.<\/p>\n<p><strong>Tool bloat: <\/strong>Another unwelcome impact of growing IT complexity has been an explosion in the number of tools security teams are being forced to manage. According to <a href=\"https:\/\/www.esg-global.com\/research\/esg-brief-cybersecurity-landscape-the-evolution-of-enterprise-class-vendors\">analyst ESG Research<\/a>, the majority of enterprises today use more than 25 different security tools. This tool bloat helps no-one, especially not organizations already straining to manage IT complexity with limited human resources.<\/p>\n<p><strong>The Art of Cybersecurity<\/strong><\/p>\n<p>First and foremost, it\u2019s clear that organizations need to focus on strategically investing in ways to make the business more resilient as a path to growth and success. With a security partner that enables the organization to prepare for, withstand, and rapidly recover from threats, cybersecurity can become an artform, freeing the organization to go further and do more.<\/p>\n<p>Trend Micro\u2019s ability to orchestrate our unique combination of proven foresight, cross-generational security strategy (XGen<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/>), and passionate people enable us to make cybersecurity art form. Always looking forward and making early \u2018bets\u2019 on technology, our foresight has enabled us to be first to the game in securing virtualization, hybrid cloud and containers, helping our customers take advantage of new environments early and securely. Our global research division, Trend Micro Research, looks at threats and challenges of today and tomorrow, along with vulnerabilities via the Zero Day Initiative, with a focus on positively impacting both Trend Micro\u2019s solutions as well as the broader industry. XGen<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> security is a cross-generational strategy that delivers smart, optimized and connected solutions for protecting users, hybrid clouds, and networks. And our passionate people work around the clock and across the globe to provide the expertise, insights, and creative thinking we need to protect our customers. That passion extends to the world at large, with a culture of giving and spreading of security knowledge inherent to our corporate social responsibility strategy.<\/p>\n<p>Built on three decades of experience, Trend Micro is focused on making the world safe to exchange digital information. Our approach to doing this has been elevated to an art form, focused on helping \u00a0organizations like yours be more resilient and have the freedom to go further and do more in this unpredictable and chaotic world.<\/p>\n<p>For more details on how we make cybersecurity beautiful, check out: <a href=\"http:\/\/www.TheArtofCybersecurity.com\">www.TheArtofCybersecurity.com<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/beauty-out-of-chaos-elevating-cybersecurity-to-an-art-form-part-2\/\">Beauty Out of Chaos: Elevating Cybersecurity to an Art Form \u2013 Part 2<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/beauty-out-of-chaos-elevating-cybersecurity-to-an-art-form-part-2\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Leah MacMillan| Date: Thu, 07 Mar 2019 15:00:23 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"157\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1-300x157.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1-300x157.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1-768x401.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1-1024x535.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1-640x334.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1-900x470.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1-440x230.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1-380x199.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/03\/TRM-8915_RSA_Social1.jpg 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Art and cybersecurity are not two worlds usually seen sharing the same orbit. But at Trend Micro we believe there\u2019s a vision, a mastery of skill and a passion which unites both. It\u2019s an approach we\u2019ve spent the past three decades honing as serious barriers have emerged to challenge IT efforts to support the business&#8230;.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/beauty-out-of-chaos-elevating-cybersecurity-to-an-art-form-part-2\/\">Beauty Out of Chaos: Elevating Cybersecurity to an Art Form \u2013 Part 2<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[21153,714],"class_list":["post-14778","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-art-of-cybersecurity","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14778"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14778\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14778"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}