Yes, you read it correctly: Shadow OT, with an O. We have barely managed to deal with Shadow IT, and a new threat already looms at the horizon. Operational Technology (OT) has become as affordable and available as IT, which leads to yet another cause of IT management worries.
A hospital, a government organization and a television broadcaster: their business models couldn’t be further apart, yet they struggle with very similar security challenges. All three asked Trend Micro to help them out, and all three now enjoy comprehensive and easily managed company wide security. Continue reading
Door David Sancho, Senior Antivirus Researcher, Trend Micro
Smart cybercriminals rely on rational decisions
Cybercriminals today are going all in with digital extortion. Their business model isn’t exactly new. “I want you to do this, or I’ll break your legs”, is easily translated to “I want you to do this, because I have your data.” Extortion has always existed and it’s a brilliant business model, albeit an unethical one. Therefore, I’m not at all surprised by the popularity of the digital variant today. You only have to look at the massive succes of ransomware to see wat I mean. Continue reading
Guest blog by Chris Van Den Abbeele – Global Solution Architect Datacenter en Cloud Security, Trend Micro
Automated virtual patching raises your security level and lowers your operational expenses.
Updating can be a painful process. It takes a lot of time, isn’t without risk and inherently leads to downtime. Virtual updates are just as safe, immediately available and best of all, free of complications. Physical updates remain a necessity, but in order to address the most urgent issues, you’re better off going virtual. Continue reading
Vulnerabilities and their exploitation are still the root cause of most breaches. Astonishingly, Gartner predicts that through 2020, 99% of the vulnerabilities exploited will continue to be the ones known by security and IT professionals for at least one year!
Today, more urban centers than ever are implementing a range of advanced technological systems: it’s the beginning of so called smart cities. These sensors and networks used in combination with citizens’ mobile devices create smarter cities capable of reduced pollution, increased safety, better engagement with residents and more accessible transportation options. As the majority of the world’s population – 65 percent – will call a city home by 2040, these IoT-centered, city-wide initiatives are well worth the investment. Continue reading
As we bid farewell to the final days of 2016, it’s time to start looking ahead to the New Year and what we hope to accomplish within the next 365 days. Year after year, some Chief Information Security Officers (CISOs) set lofty goals of securing all data to fullest extent wherever it resides in their company’s network. However, as many New Year resolutions go, these aspirations often fall because they’re not founded on sound enterprise risk management principles. Continue reading
5 attack scenarios and 3 tips how to avoid them
Article written by specialists at the Trend Micro Foward-Looking Threat Research Lab
Over sixty years ago, healthcare professionals were among the first to adopt a new communication tool: the pager. This little instrument combined technology from walkie-talkies and automobile radios, resulting in a handy little tool that allowed the transmission of messages (or ‘pages’) to other pagers up to 25 miles away. And although smartphones have taken over communication in the outside world, the healthcare industry has never really said goodbye to pagers. They offer a few crucial advantages to healthcare professionals: they don’t suffer from the often weak cellular coverage in hospitals nor do they interfere with medical equipment. Continue reading
‘Next-generation’ endpoint protection or next-gen AV has been getting a lot of press recently. But what does the term actually mean? For IT security managers under pressure, the most important thing isn’t the latest buzzword but finding a solution which is effective in protecting their organization from an increasingly agile and determined online enemy. Multiple threat protection techniques working in synergy is the key to this. Continue reading