TrendMicro

SecurityTrendMicro

Security Round-up: Five Things We’ve Learned in 2017

Credit to Author: Trend Micro| Date: Wed, 27 Dec 2017 14:00:04 +0000

The past 12 months have been packed with geopolitical incidents, global malware threats and ubiquitous big-name data breaches. From the CIA Vault7 and NSA Shadow Brokers leaks at the start of the year, to the WannaCry and NotPetya ‘ransomware’ campaigns, and Uber’s shocking revelations just last month, there’s been plenty for UK CISOs to ruminate…

Read More
SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of December 18, 2017

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 22 Dec 2017 15:51:16 +0000

In the 2000 movie High Fidelity, the concept of making lists is a dominant focus. What are your top five favorite records? Top five side one, track ones? Top five dream jobs? In the movie, Rob Gordon, portrayed by John Cusack, decides to categorize his top five most memorable breakups in order to determine why…

Read More
SecurityTrendMicro

With 1.4 Billion Stolen Log-Ins on the Dark Web, it’s Time to Take Password Management Seriously

Credit to Author: Michael Miley| Date: Tue, 19 Dec 2017 14:58:08 +0000

Today, we'll take a deep dive into passwords, including what vulnerabilities weak passwords can open up and how to improve authentication security.Last week you may have seen some worrying news: researchers probing the darkest corners of the underground web found a secret trove containing 1.4 billion breached usernames and passwords. Yes, that’s right: 1.4 BILLION. Yours might very well be among them, and if you reuse the same password across numerous accounts, they may all now…

Read More
SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of December 11, 2017

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 15 Dec 2017 16:06:45 +0000

If you read my weekly blog or follow me on Twitter, you know that I’m a huge sports fan. Unfortunately, when you don’t live in the town of your favorite team, you can be subject to blackout rules. So, my husband and I decided to purchase NFL Sunday Ticket from DirecTV. Fast forward to a…

Read More
SecurityTrendMicro

Applying Lean to Information Risk Management

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Tue, 12 Dec 2017 13:00:36 +0000

Lean Manufacturing brings significant benefits to industry, including cost reduction, quality improvement, reduced cycle time, and greater customer satisfaction (See “The Machine that Changed the World”, Womak, J., Jones, D., and Roos, D., Free, Press, 1990 for the groundbreaking analysis of Toyota’s Lean Production). Can Information Technology organizations apply Lean to cybersecurity? The core challenge…

Read More