TrendMicro

SecurityTrendMicro

The Risk of IoT Security Complacency

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Wed, 05 Sep 2018 12:04:14 +0000

Cyber security professionals are increasingly relying on their key security solutions to bridge staff and knowledge gaps.

Trend Micro recently surveyed 1,150 IT executives globally. We found a gap between the perceived risk from IoT and the planned mitigation for that risk. Most senior executives recognize that IoT can introduce security risk to the organization, but few will invest resources to remediate that risk. Click here for more details. Senior leadership should…

The post The Risk of IoT Security Complacency appeared first on .

Read More
SecurityTrendMicro

Securing the Convergence of IT with OT

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Tue, 04 Sep 2018 10:00:00 +0000

The Industrial Internet of Things (IIoT) is the leading edge of the convergence of Operational Technology (OT) with IT. This convergence begins with network connectivity but requires enhancements in operational procedures, technology, and training as well. Beginning with the network, IT and OT use different protocols. Within the OT world, vendors have created many proprietary…

The post Securing the Convergence of IT with OT appeared first on .

Read More
SecurityTrendMicro

BEC is Big Business for Hackers: What makes these attacks so hard to prevent?

Credit to Author: Trend Micro| Date: Fri, 31 Aug 2018 15:34:48 +0000

For years, one of the most lucrative ways for hackers to generate profits was through ransomware attacks. These instances involve the use of strong encryption to lock victims out of their files and data – attackers then sell the decryption key in exchange for an untraceable Bitcoin ransom payment. Now, however, another highly profitable attack…

The post BEC is Big Business for Hackers: What makes these attacks so hard to prevent? appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Air Canada and Cryptojacking

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 31 Aug 2018 14:33:05 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Air Canada reported a data breach that exposed passport details for more than 20,000 customers on their mobile app. Also, Trend Micro’s Midyear Security Roundup reported an…

The post This Week in Security News: Air Canada and Cryptojacking appeared first on .

Read More
SecurityTrendMicro

Cybercriminals Changing Tactics as Seen in First Half Report

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 28 Aug 2018 12:05:30 +0000

Today, Trend Micro released its first half 2018 security roundup report in which we want to share the threat intelligence we discovered through the Trend Micro™ Smart Protection Network™ that allows us to identify the threats that have targeted our customer base. Below are some thoughts I’d like to share with you about these trends…

The post Cybercriminals Changing Tactics as Seen in First Half Report appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Facebook and Faxploits

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 24 Aug 2018 13:31:22 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Facebook removed 652 fake accounts originating from Russia and Iran. Also, Microsoft identified and removed fake internet domains that mimicked U.S political institutions thought to be created…

The post This Week in Security News: Facebook and Faxploits appeared first on .

Read More
SecurityTrendMicro

AI and Machine Learning: Boosting Compliance and Preventing Spam

Credit to Author: Trend Micro| Date: Thu, 23 Aug 2018 12:00:39 +0000

Some of the most advanced strategies in the current technology and analytics spaces include artificial intelligence and machine learning. These innovative approaches can hold nearly endless possibilities for technological applications: from the ability to eliminate manual work and enable software to make accurate predictions based on specific performance indicators.   In this way, it’s no…

The post AI and Machine Learning: Boosting Compliance and Preventing Spam appeared first on .

Read More
SecurityTrendMicro

Simplifying and Prioritizing Advanced Threat Response Measures

Credit to Author: TJ Alldridge| Date: Thu, 23 Aug 2018 12:09:31 +0000

I had to go to the doctor the other day because I was miserable and sick. I don’t like going to the doctor so I waited until my stuffy nose and congestion turned into a full blown sinus infection. The doctor said this thing was going around, and I should be better in a few…

The post Simplifying and Prioritizing Advanced Threat Response Measures appeared first on .

Read More