Cyber-Attacks: How to Stop a Multibillion-Dollar Problem

By Ed Cabrera, Chief Cybersecurity Officer for Trend Micro and Martin Bally, Vice President & Chief Security Officer for Diebold Nixdorf  Where there’s money, there has always been crime. Traditional bank robbery and physical assaults on ATMs are still a challenge, and now a new breed of cyber-enabled theft—using ATMs as the endpoint for cash-outs— has become a multibillion-dollar…
The post Cyber-Attacks: How to Stop a Multibillion-Dollar Problem appeared first on . Read More HERE…

Read more

It’s Everyone’s Job to Ensure Online Safety at Work

As part of our effort to support National Cyber Security Awareness Month I wanted to provide information on the need for everyone within a business to be aware of their role in keeping the organization safe from cyber attacks.  Let’s discuss some of the areas where we see existing organizations employees may be lacking in…
The post It’s Everyone’s Job to Ensure Online Safety at Work appeared first on . Read More HERE…

Read more

Trend Micro Redefines Endpoint Security with Apex One™

Today, Trend Micro is excited to bring you Apex One™, the evolution of our endpoint security solution for enterprise. Apex One™ combines a breadth of threat detection & response capability with investigative features, in a single agent. Over the last few years, endpoint investigative features have become interesting in the marketplace, spurring the growth of…
The post Trend Micro Redefines Endpoint Security with Apex One™ appeared first on . Read More HERE…

Read more

The BEC List: Helping Thwart Business Email Compromise through Collaboration

Today, the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) gave the JD Falk Award to the Business Email Compromise (BEC) List. The BEC List comprises cybersecurity firms, researchers and internet infrastructure companies that help deal with cybercriminal activities and schemes. The JD Falk Award is given to individuals or groups whose meritorious work has…
The post The BEC List: Helping Thwart Business Email Compromise through Collaboration appeared first on . Read More HERE…

Read more

The Many Paths To A Cybersecurity Education

Ask a room full of cybersecurity professionals about their educational background and how they got started on their career path and you’re going to get a myriad of different answers. From one perspective, that’s frustrating. It’s hard to confidently recommend a path for people starting out when almost any path can end up at your…
The post The Many Paths To A Cybersecurity Education appeared first on . Read More HERE…

Read more

Let’s Continue the Skills Gap Conversation

Most analysis is that the cybersecurity skills gap or shortage is getting worse. ESG reported in CSOOnline that 2018 had the highest levels, at 51%, where organizations “claimed their organization had a problematic shortage of cybersecurity skills.” It’s a complex problem, but I believe with non-complex solutions.   The Problems (and the Solutions) HR &…
The post Let’s Continue the Skills Gap Conversation appeared first on . Read More HERE…

Read more

Stop Office 365 Credential Theft with an Artificial Eye

We all know that email remains by far the number one threat vector facing organizations today. Trend Micro blocked more than 20.4 billion threat in the first half of 2018 alone, nearly 83% of which were email borne. But there’s more: corporate email accounts have also become a key target for attackers in their own…
The post Stop Office 365 Credential Theft with an Artificial Eye appeared first on . Read More HERE…

Read more

Sound, Fury, And Nothing One Year After Equifax

One year ago today, Equifax suffered what remains one of the largest and most impactful data breaches in U.S. history. Last September, it was revealed that the personal information of 145 million Americans, almost 700,000 UK citizens, and 19,000 Canadians was stolen by cybercriminals. This information included names, addresses, birthdays, Social Security numbers, and—in some…
The post Sound, Fury, And Nothing One Year After Equifax appeared first on . Read More HERE…

Read more

Stop Impersonations of Your CEO by Checking the Writing Style

If one of your employees receives an email that looks like it’s from the CEO asking to send sensitive data or to make a wire transfer, could that employee spot it as a fake based on how it is written? He or she may be so concerned with pleasing the CEO that they may urgently…
The post Stop Impersonations of Your CEO by Checking the Writing Style appeared first on . Read More HERE…

Read more

Securing the Convergence of IT with OT

The Industrial Internet of Things (IIoT) is the leading edge of the convergence of Operational Technology (OT) with IT. This convergence begins with network connectivity but requires enhancements in operational procedures, technology, and training as well. Beginning with the network, IT and OT use different protocols. Within the OT world, vendors have created many proprietary…
The post Securing the Convergence of IT with OT appeared first on . Read More HERE…

Read more