Innovate or Die?

The recent series of IT acquisitions and IPOs highlight a simple economic fact: companies that fail to keep up with the fast-paced innovation of technology can easily become targets for acquisition. Mark Twain put it this way: History doesn’t repeat itself, but it rhymes. As a former Gartner analyst, I find it irresistible to comment…
The post Innovate or Die? appeared first on . Read More HERE…

Read more

This Week in Security News: Phishing Campaigns and a Biometric Data Breach

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about ever-increasing amounts of phishing campaigns and how Trend Micro caught 2.4 million attacks of this type — a 59% increase from 1.5 million in the…
The post This Week in Security News: Phishing Campaigns and a Biometric Data Breach appeared first on . Read More HERE…

Read more

Customer Perspective: Catching the thief lurking in the shadows with EDR and MDR

A guest blog by Ian Loe, Senior Vice President, Cybersecurity, NTUC Enterprise Co-operative Limited News flash: aided by time, persistence and smarts, advanced cybersecurity felons are leapfrogging traditional security systems to compromise confidential data. Realising this, we at NTUC Enterprise have been looking into new security technologies that help address these rising concerns. One of…
The post Customer Perspective: Catching the thief lurking in the shadows with EDR and MDR appeared first on . Read More HERE…

Read more

Cyberattack Lateral Movement Explained

[Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement. And the reason why I want to tackle this today is because I’ve had some conversations in the last few days that have really kind of hit that…
The post Cyberattack Lateral Movement Explained appeared first on . Read More HERE…

Read more

Why XDR Is A Big Deal, and Is Different from SIEM and Platforms

In Jon Clay’s post, he does a great job of explaining the evolution from EDR to XDR. In short, he explained that Endpoint Detection and Response (EDR) is great, but that having sources of information beyond endpoint is better. The ‘X’ in XDR is essentially ‘many’ or whatever we can add to provide a broader,…
The post Why XDR Is A Big Deal, and Is Different from SIEM and Platforms appeared first on . Read More HERE…

Read more

XDR Needs Network Data and Here’s Why

As we’ve discussed in previous blogs, XDR is a better way to detect attacks within a network since it is able to coordinate and collaborate threat intelligence and data across multiple threat vectors, including endpoint (including mobile and IIoT), server, network, messaging, web, and cloud. In this blog I want to discuss an area of…
The post XDR Needs Network Data and Here’s Why appeared first on . Read More HERE…

Read more

Digital skimmers: What are they and how can I keep my card details safe online?

A few weeks ago, British Airways was hit by the largest ever regulatory fine of its kind, after global customers visiting its website had their card data stolen. The $228m penalty levied by the UK’s privacy watchdog reflects the seriousness of the attack and the carrier’s failure to protect its customer’s personal and financial information….
The post Digital skimmers: What are they and how can I keep my card details safe online? appeared first on . Read More HERE…

Read more

This Week in Security News: Ransomware Campaigns and Cryptocurrency Miners

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about three different ransomware campaigns that caused havoc in different public sectors. Also, read how threat actors are infecting vulnerable Linux servers with a cryptocurrency miner….
The post This Week in Security News: Ransomware Campaigns and Cryptocurrency Miners appeared first on . Read More HERE…

Read more

Will XDR Improve Security?

Cybercriminals and malicious hackers have been shifting their tactics, techniques, and procedures (TTPs) to improve their ability to infiltrate an organization and stay under the radar of security professionals and solutions. Moving to more targeted attack methods appears to be a mainstay among threat actors, which requires organizations to improve their visibility into the entire…
The post Will XDR Improve Security? appeared first on . Read More HERE…

Read more

Windows Server 2008 End of Support: Are you Prepared?

On July 14th, 2015, Microsoft’s widely deployed Windows Server 2003 reached end of life after nearly 12 years of support. For millions of enterprise servers, this meant the end of security updates, leaving the door open to serious security risks. Now, we are fast approaching the end of life of another server operating system –…
The post Windows Server 2008 End of Support: Are you Prepared? appeared first on . Read More HERE…

Read more