Unified Cybersecurity Platform: Why CISOs are Shifting

Unified Cybersecurity Platform: Why CISOs are Shifting

Unified Cybersecurity Platform: Why CISOs are Shifting Risk Management Our global study polled more than 2,300 IT security decision makers to discover how to best assist and support SecOps teams with a unified cybersecurity platform so you can be more resilient with less resources. By: Trend Micro April 24, 2022 Read time:  ( words) As the number of threats continues to rapidly increase and the corporate attack surface expands due to the accelerated shift to…

Read More

Cybersecurity Predictions for 2022

Cybersecurity Predictions for 2022

Zero day and known vulnerabilities Increased media attention and big payouts will motivate cybercriminals to launch an unprecedented number of zero-day exploits, surpassing the record-setting number in 2021. However, security leaders still need to look out for older, known vulnerabilities. As we previously mentioned, old vulnerabilities are still traded and purchased in underground markets, as enterprises often struggle with complex patch management. In 2022, we’ll see malicious actors continuing to take advantage of the growing…

Read More

Attack Surface Management Partner Bit Discovery Bolsters Offering

Attack Surface Management Partner Bit Discovery Bolsters Offering

Security starts with visibility: you can’t protect what you can’t see. And yet, this is a perennial problem in cybersecurity. We’re excited to bring attack surface discovery capabilities to the Trend Micro One platform, providing ongoing visibility to internal assets (devices, identities, applications) but also external, Internet-facing assets. And we’re doing the latter in partnership with Bit Discovery, an innovative start-up founded by Jeremiah Grossman (previously co-founder of WhiteHat Security). How bad is the attack…

Read More

Why the Mitre Engenuity ATT&CK Evaluations Matter for CISOs

Why the Mitre Engenuity ATT&CK Evaluations Matter for CISOs

Why the Mitre Engenuity ATT&CK Evaluations Matter for CISOs This year’s MITRE Engenuity™ ATT&CK Evaluation simulates techniques associated with notorious threat groups Wizard Spider and Sandworm to test solutions’ ability to detect and stop APT and Targeted Attacks. By: Trend Micro April 08, 2022 Read time:  ( words) As the cyber attack surface continues to rapidly expand, enterprises need a security solution that can help organizations to better understand, communicate, and mitigate cyber risk across…

Read More

Research Firm: TM

Research Firm: TM

If organizations weren’t committed to the cloud before the pandemic, they certainly are now. Two years of sometimes gale-force business headwinds, market uncertainty and operational adversity have confirmed the criticality of cloud to boardroom leaders. By April 2021, a third of global organizations said they were running more than 50% of their workloads in the cloud. By this fall, it’s estimated that over half (56%) of enterprises worldwide will be. That’s why Trend Micro has…

Read More

MITRE Engenuity ATT&CK Tests

MITRE Engenuity ATT&CK Tests

By developing a common language to arm analysts with a standard to describe attacks, MITRE ATT&CK has become a critical knowledgebase for cyber defenders, ultimately improving security efficiency and response time. The annual MITRE Evaluation compares industry-wide innovation to deliver the solutions necessary to detect and respond to the evolving threat landscape. The evaluation offers cybersecurity solution buyers and customers with an unbiased option to evaluate security products to arm themselves against the latest advances from attackers…

Read More

This Week in Security News – April 1, 2022

This Week in Security News – April 1, 2022

Read on:  Probing the Activities of Cloud-Based Cryptocurrency-Mining Groups Trend Micro‘s research into cloud-based cryptocurrency mining sheds light on the malicious actor groups involved in this space, their ongoing battle for cloud resources, and the actual extent of the impact of their attacks. Lapsus$ ‘Back from Vacation’ Lapsus$ added IT giant Globant plus 70GB of leaked data – including admin credentials for scads of customers’ DevOps platforms – to its hit list. The Lapsus$ data…

Read More

Why Organizations Should Take Cloud-Based Cryptocurrency-Mining Attacks Seriously

Why Organizations Should Take Cloud-Based Cryptocurrency-Mining Attacks Seriously

But that’s just the tangible cost of a cryptocurrency-mining attack. There are also indirect consequences that an affected organization might encounter, such as the disruption and slowdown of operations that could result in loss of revenue or even damage to the reputation of the organization because of the inconveniences brought upon its customers. The major players in the cloud-based cryptocurrency mining landscape are diverse in terms of their tools, techniques, and even the way they…

Read More

How CISOs can Mitigate Cryptomining Malware

How CISOs can Mitigate Cryptomining Malware

How CISOs can Mitigate Cryptomining Malware Risk Management Learn more about cloud-based cryptomining, its repercussions, and how CISOs can create an effective risk mitigation strategy for this threat. By: Jon Clay March 29, 2022 Read time:  ( words) As cryptocurrencies continue to grow in popularity, organizations are increasingly at risk for cryptomining attacks. In fact, Apache Log4j (Log4Shell)—the holiday gift no one asked for—was observed to be mostly used for cryptomining and ransomware by cybercriminals….

Read More

This Week in Security News – March 25, 2022

This Week in Security News – April 1, 2022

Read on:  An Investigation of Cryptocurrency Scams and Schemes The use of cryptocurrency has increased tremendously since it was first introduced in 2009. As blockchain technology has enabled use of cryptocurrency to expand, interest and the assets that are generated in its use also continue to grow. However, the virtual environment that allows it to flourish has also become fertile ground for cybercriminals to exploit, so much so that there has been a constant stream…

Read More
1 11 12 13 14 15 18