Improve Cyber Security Posture with 2023 Predictions

Improve Cyber Security Posture with 2023 Predictions

Digitalization has made enterprise cybersecurity more complex than ever before. Taking that context into account, Future/Tense: Trend Micro Security Predictions for 2023 looks at some of the key trends organizations will need to address to strengthen their security posture for the year ahead. This blog focuses on four priority threat predictions—cloud misconfigurations, hidden vulnerabilities, the vanishing network perimeter, and evolving ransomware business models—as well as a growing trend that will redefine enterprise cybersecurity going forward:…

Read More

Intrusion Detection & Prevention Systems Guide

Intrusion Detection & Prevention Systems Guide

Don’t get stuck choosing between on or the other. Ideally you want to find an IDS and IPS solution that integrate – forming IDPS – for full detection and response capabilities. IDS will give you a deep understanding of how traffic is moving across your network, while IPS provides active network security by preventing and remediating detections. Making an informed decision Not all security solutions are the same. Some vendors are marketing masters who make…

Read More

Cyber Insurance Policy Underwriting Explained

Cyber Insurance Policy Underwriting Explained

Businesses are often in the dark when it comes to applying for a cyber insurance policy. What documentation is necessary? What should they expect? What security controls are underwriters actually looking for? I spoke to John Hennessy, RVP of underwriting at Cowbell, for an insider’s perspective on the underwriting process. Q: What should people know about cyber insurance underwriters?Q: What does the typical underwriting engagement look like?Q: What are some of the non-security factors underwriters…

Read More

Cybersecurity Plan: 3 Keys for CISOs

Cybersecurity Plan: 3 Keys for CISOs

Today’s CISO is a lot like a football coach. Both need to have a vision for success. Both need to build a team and win over the respect of their players. And both are judged on performance. In football, the main performance metric is wins, including all the steps that go into winning: first downs, completed passes, turnovers, touchdowns. What does performance mean for today’s CISO? Well-known KPIs, such as mean time to recovery (MTTR),…

Read More

Data Exfiltration Prevention with SASE

Data Exfiltration Prevention with SASE

Read: The boom in digital connectivity has made data privacy a top concern for businesses. As businesses use more SaaS and cloud applications existing in public clouds, they lose visibility and control. Data exfiltration can not only cause operational and reputational harm, but can lead to revenue losses, hefty compliance fines, expensive class-action lawsuits, and even ransomware demand and recovery costs.  Unfortunately, protecting data is not a simple feat in hybrid- and multi-cloud environments. This…

Read More

How a Unified Security Platform Protects the Cloud

How a Unified Security Platform Protects the Cloud

Cloud solutions are business-essential these days. Organizations are using hybrid and multi-cloud environments to connect users, data, applications, workloads, and devices in dynamic ways. But that growing dependence on the cloud has also expanded the attack surface, adding layers of potential vulnerability and putting security and compliance risks at the top of enterprise concerns. While it’s common practice to address these threats with best-of-breed point solutions, the sheer number of products required to cover the…

Read More

Security Culture Matters when IT is Decentralized

Security Culture Matters when IT is Decentralized

Decentralized structures can give organizations powerful agility and speed up the deployment of new technologies. But the cost of decentralization is that it’s hard to ensure decisions are made consistently and with all the right considerations in mind—which is a very real problem when it comes to security. Fifty-six percent of CISOs in EY’s 2021 Global Information Security Survey said their teams are consulted late or not at all when company leaders make time-sensitive strategic…

Read More

Email Security Best Practices for Phishing Prevention

Email Security Best Practices for Phishing Prevention

Organizations understand the importance of protecting sensitive information and avoiding a data breach. However, security teams are struggling to contain phishing attacks. Security risks increase due to the inability to view and successfully filter email threats, accurately differentiate between marketing and phishing emails, and apply a multi-layered email security approach with rules to holistically track traffic and stop malicious actions in real life. This article explores email security best practices to defend against phishing attacks…

Read More

7 Cyber Attack Vectors & How to Protect Them

7 Cyber Attack Vectors & How to Protect Them

7 Cyber Attack Vectors & How to Protect Them Risk Management The quicker a cyberattack is identified, the less it costs. Jon Clay, VP of Threat Intelligence, reviews 7 key initial attack vendors and provides proactive security tips to help you reduce cyber risk across the attack surface. By: Jon Clay November 15, 2022 Read time:  ( words) Digital transformation and remote work have rapidly expanded the attack surface. As the collection of applications, websites,…

Read More

4 Types of Cyber Crime Groups

4 Types of Cyber Crime Groups

The adage “teamwork makes dreamwork” extends to cybercriminals as well. To launch more successful cyberattacks, malicious actors with different specialized skills have conglomerated to form Cybercrime as a Service (CaaS). We’re now seeing people and groups specialize in various parts of the attack lifecycle. This means that we’re likely going to see less mistakes made leading to detections, and we should expect multiple groups colonizing an infected network. Within CaaS there are four types of…

Read More
1 2 3 4 5 6 9