As we bid farewell to the final days of 2016, it’s time to start looking ahead to the New Year and what we hope to accomplish within the next 365 days. Year after year, some Chief Information Security Officers (CISOs) set lofty goals of securing all data to fullest extent wherever it resides in their company’s network. However, as many New Year resolutions go, these aspirations often fall because they’re not founded on sound enterprise risk management principles. Continue reading
5 attack scenarios and 3 tips how to avoid them
Article written by specialists at the Trend Micro Foward-Looking Threat Research Lab
Over sixty years ago, healthcare professionals were among the first to adopt a new communication tool: the pager. This little instrument combined technology from walkie-talkies and automobile radios, resulting in a handy little tool that allowed the transmission of messages (or ‘pages’) to other pagers up to 25 miles away. And although smartphones have taken over communication in the outside world, the healthcare industry has never really said goodbye to pagers. They offer a few crucial advantages to healthcare professionals: they don’t suffer from the often weak cellular coverage in hospitals nor do they interfere with medical equipment. Continue reading
As we close out 2016 and prepare to ring in the New Year we must take a look back at the past 11 months before we can predict what lies ahead. In the realm of cybersecurity, that means evaluating how the threat landscape has changed to accurately assess how it will continue to evolve. Continue reading
The last few years, whenever VMware holds its annual user event VMworld, the concept of hybrid cloud is discussed at length. The topic is still the same but the questions have gradually shifted, from ‘how do I prepare for the hybrid cloud when it arrives?’ to ‘the hybrid cloud is already here. How do I deal with it?’. Continue reading
The reasons for switching are clear: no investments upfront because you pay as you add users, no personnel required for imaging your infrastructure, easier access from anywhere, … you can probably come up with some extra reasons as well. Continue reading
All crime reflects the culture that it happens in. What is perfectly legal in one country can be a serious crime in another. What makes the difference, generally, is the different cultures in those counties. Cultural reflections in crime are something you see in online crime as well.
While there are some things that are universal to online crime around the globe (like malware), a lot of online crime reflects the culture just like real-world crime does. This is a theme that has emerged over the past three years in our ongoing investigations into the different countries’ markets that make up the global Cybercrime Underground Economy. We’ve just released our latest report in that series, focusing on France, a new addition to our country roster. Continue reading
If you follow the enterprise security market, you are no doubt inundated by vendors who claim they have the latest and greatest security capability. The challenge is discerning if these claims are substantive or snake oil. Continue reading
Two years after the regulation was first announced, the progress is visible but it’s slow. As often happens with regulation, it’s going to take a whipping boy to understand the gravity of the situation for most organisations. One high-profile case of a company handing money over for non-compliance under the General Data Protection Regulation (GDPR) will be the required wake-up call the rest of the industry needs to get their act together. Continue reading
Pick up any newspaper or log-on to your favorite tech news site today and you’re likely to come across a story about ransomware. Trend Micro alone has blocked over 100 million such threats since last October and counting.
The best way of tackling ransomware is to take preventative measures built around layered protection. But the first step we need to take is understanding the problem. So let’s take a closer look at exactly what this new malware menace is and the implications for organizations. Continue reading
While these certainly seem like the important issues to face in a hacking scenario, an article from Trend Micro Senior Threat Researcher Kyle Wilhoit points out that asking these questions really doesn’t help. Sure, they may help bring the cyber criminal to justice. However, these types of questions don’t do much in terms of fixing the real problem at hand, which is that the hacked entity’s cyber security needs an upgrade. Continue reading