TrendMicro

SecurityTrendMicro

What Enterprise Leaders Should know about Persistent Threats in 2019

Credit to Author: Trend Micro| Date: Thu, 31 Jan 2019 15:00:29 +0000

Staving off critical threats in the current cybersecurity landscape is a tall order for any size organization. As hackers continually shift and improve upon their attack and breach strategies, IT and security stakeholders must do their best to keep up and remain informed of these trends. This is one of the best and most successful…

The post What Enterprise Leaders Should know about Persistent Threats in 2019 appeared first on .

Read More
SecurityTrendMicro

How Machine Learning can Expose and Illustrate Network Threats

Credit to Author: Trend Micro| Date: Wed, 30 Jan 2019 14:34:21 +0000

Although machine learning algorithms have been around for years, additional use cases are being discovered and applied all the time, particularly when it comes to network and data security. As years have passed, the skills and sophisticated approaches being utilized by hackers have risen in severity and frequency, and white hats as well as enterprise…

The post How Machine Learning can Expose and Illustrate Network Threats appeared first on .

Read More
SecurityTrendMicro

Informing Your Security Posture: How Cybercriminals Blend into the Background

Credit to Author: Trend Micro| Date: Tue, 29 Jan 2019 14:00:23 +0000

Maintaining protection over an enterprise’s critical data, systems and assets is a continual uphill battle. Not only are chances good that the business’s digital footprint is growing through new applications, but hackers are also constantly bolstering their capabilities to silently breach platforms and maintain a presence under the radar of the IT team. In the…

The post Informing Your Security Posture: How Cybercriminals Blend into the Background appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Ransomware and Cyber Threats

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 25 Jan 2019 14:00:09 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about new routines for encryption of JobCrypter ransomware. Also, understand how Emotet has managed to evolve into one of the most notorious cyber threats in existence….

The post This Week in Security News: Ransomware and Cyber Threats appeared first on .

Read More
SecurityTrendMicro

Impacts to Enterprise Security: A Look at as-a-service Attacks

Credit to Author: Trend Micro| Date: Thu, 24 Jan 2019 14:20:08 +0000

Ever since certain solutions have begun being offered “as-a-service,” the market for this method of delivery has exploded. Now, elements like software-as-a-service, infrastructure-as-a-service and platform-as-a-service are key mainstay components of enterprise IT, with the market values to prove it. According to MarketWatch, the global SaaS market is on track to expand by a more than…

The post Impacts to Enterprise Security: A Look at as-a-service Attacks appeared first on .

Read More
SecurityTrendMicro

Protecting Critical Infrastructure and Roadways: How Smart Cities Create New Risks

Credit to Author: Trend Micro| Date: Wed, 23 Jan 2019 14:14:39 +0000

Advanced technology has changed countless facets of everyday life, from internal enterprise processes to consumer pursuits and beyond. Even the design, management and support for large and small cities has shifted thanks to innovative smart city systems. While advanced components to support utilities, critical infrastructure, traffic and more can bring numerous benefits, these solutions also open…

The post Protecting Critical Infrastructure and Roadways: How Smart Cities Create New Risks appeared first on .

Read More
SecurityTrendMicro

BEC Will Reach Two Levels Deeper

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Tue, 22 Jan 2019 14:00:18 +0000

  In our predictions report for 2019, “Mapping the Future: Dealing with Pervasive and Persistent Threats,” we foresaw an increase in the rate of BEC (business email compromise) attacks: “Business email compromise will go two levels down in the org chart.” From the report:     “Business email compromise (BEC) remains a very potent and…

The post BEC Will Reach Two Levels Deeper appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Risky Radio Remotes and Cybercrime

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 18 Jan 2019 15:18:00 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Trend Micro’s new research on radio frequency technology and the risks of radio remote controllers. Also, understand why there is a rise in physical crime…

The post This Week in Security News: Risky Radio Remotes and Cybercrime appeared first on .

Read More