Vulnerabilities and their exploitation are still the root cause of most breaches. Astonishingly, Gartner predicts that through 2020, 99% of the vulnerabilities exploited will continue to be the ones known by security and IT professionals for at least one year!
In September, we announced our new email security technologies powered by XGen™ and a new product, Smart Protection for Office 365. One key technology introduced was our new AI based Email fraud, or Business Email Compromise (BEC), detection technique. Continue reading
Today, more urban centers than ever are implementing a range of advanced technological systems: it’s the beginning of so called smart cities. These sensors and networks used in combination with citizens’ mobile devices create smarter cities capable of reduced pollution, increased safety, better engagement with residents and more accessible transportation options. As the majority of the world’s population – 65 percent – will call a city home by 2040, these IoT-centered, city-wide initiatives are well worth the investment. Continue reading
As we bid farewell to the final days of 2016, it’s time to start looking ahead to the New Year and what we hope to accomplish within the next 365 days. Year after year, some Chief Information Security Officers (CISOs) set lofty goals of securing all data to fullest extent wherever it resides in their company’s network. However, as many New Year resolutions go, these aspirations often fall because they’re not founded on sound enterprise risk management principles. Continue reading
5 attack scenarios and 3 tips how to avoid them
Article written by specialists at the Trend Micro Foward-Looking Threat Research Lab
Over sixty years ago, healthcare professionals were among the first to adopt a new communication tool: the pager. This little instrument combined technology from walkie-talkies and automobile radios, resulting in a handy little tool that allowed the transmission of messages (or ‘pages’) to other pagers up to 25 miles away. And although smartphones have taken over communication in the outside world, the healthcare industry has never really said goodbye to pagers. They offer a few crucial advantages to healthcare professionals: they don’t suffer from the often weak cellular coverage in hospitals nor do they interfere with medical equipment. Continue reading
‘Next-generation’ endpoint protection or next-gen AV has been getting a lot of press recently. But what does the term actually mean? For IT security managers under pressure, the most important thing isn’t the latest buzzword but finding a solution which is effective in protecting their organization from an increasingly agile and determined online enemy. Multiple threat protection techniques working in synergy is the key to this. Continue reading
If you’re reading this posting, odds are that you or someone you know is the victim of a ransomware attack. Ransomware continues to grow as a prevalent threat . The number of new ransomware families we saw in the first half of 2016 alone has already eclipsed the total 2015 volume by 172%. With ransomware attacks becoming more and more sophisticated and prevalent, we believe that the threat will potentially cause more damage going into the second half of the year.
This post is meant to tell you exactly what we think you should do if you’re looking at a ransomware screen. Most importantly, here’s what you shouldn’t do …. pay the ransom. I can’t emphasize that enough: don’t pay the ransom. Continue reading
Two years after the regulation was first announced, the progress is visible but it’s slow. As often happens with regulation, it’s going to take a whipping boy to understand the gravity of the situation for most organisations. One high-profile case of a company handing money over for non-compliance under the General Data Protection Regulation (GDPR) will be the required wake-up call the rest of the industry needs to get their act together. Continue reading
As previously discussed in part one, cloud services are a fact of life in most organizations today – whether you know it or not. When attempting to address this problem today there are three main areas where you should focus your efforts. Continue reading