Security

TrendMicro

How mobile threats impact today’s BYOD landscape

Bring-your-own-device (BYOD) has been a revolutionary concept for years now, even before it was recognized by enterprise policy. However, now that business executives and IT leaders have realized the benefits this type of strategy for their organizations, BYOD is becoming an increasingly powerful way to support efficient access and productivity. At the same time, however,…
The post How mobile threats impact today’s BYOD landscape appeared first on . Read More HERE…

Read More
TrendMicro

Zero-Day Coverage Update – Week of July 16, 2018

One night this week, I came across one of my favorite movies Willy Wonka and the Chocolate Factory. The world had gone crazy after the reclusive Willy Wonka announces that he has hidden five golden tickets in chocolate Wonka Bars that promised a factory tour and a lifetime supply of chocolate. There’s a scene at…
The post Zero-Day Coverage Update – Week of July 16, 2018 appeared first on . Read More HERE…

Read More
TrendMicro

Zero-Day Coverage Update – Week of July 9, 2018

Earlier this week, I wrote a blog covering a couple of the statistics from the Zero Day Initiative’s (ZDI) first half of 2018. One of the stats that I didn’t cover is the increasing focus on enterprise applications. The team is seeing consistent growth in submissions of Microsoft and Apple vulnerabilities, but now they’re also…
The post Zero-Day Coverage Update – Week of July 9, 2018 appeared first on . Read More HERE…

Read More
TrendMicro

The Aurora Power Grid Vulnerability and the BlackEnergy Trojan

At recent Industrial IoT security briefings, the Aurora vulnerability has come up repeatedly. Attendees ask, “Is our country’s power grid safe? How can we protect the grid? What is Aurora?” This post provides a look at Aurora, and the BlackEnergy attack that can exploit Aurora. In March 2007, the US Department of Energy demonstrated the…
The post The Aurora Power Grid Vulnerability and the BlackEnergy Trojan appeared first on . Read More HERE…

Read More
Networkworld

What are the options for securing SD-WAN?

A key component of SD-WAN is its ability to secure unreliable Internet links and identify anomalous traffic flows.SD-WAN technology providers are continuing to increase their native security features and to create robust ecosystems of network-security partners.[ See where SDN is going and learn the difference between SDN and NFV. | Get regularly scheduled insights by signing up for Network World newsletters. ]
IT managers should consider their branch network security requirements and carefully evaluate the security capabilities of leading SD-WAN providers, include their native security features and their partnerships with network security providers.To read this article in full, please click here(Insider Story) READ MORE HERE…

Read More
TrendMicro

How the Industry 4.0 Era Will Change the Cybersecurity Landscape

Today’s highly automated and connected smart factories (Industry 4.0) were born out of yesterday’s steam engines that mechanized manufacturing (Industry 1.0); mass-production lines expanded with the advent of electricity (Industry 2.0); and then IT-enabled manufacturing plants ushered in the era of connected industrial control systems with programmable logic controllers (PLC). While enterprises struggle to enhance…
The post How the Industry 4.0 Era Will Change the Cybersecurity Landscape appeared first on . Read More HERE…

Read More
Networkworld

The aftermath of the Gentoo GitHub hack

Gentoo GitHub hack: What happened?
Late last month (June 28), the Gentoo GitHub repository was attacked after someone gained control of an admin account. All access to the repositories was soon removed from Gentoo developers. Repository and page content were altered. But within 10 minutes of the attacker gaining access, someone noticed something was going on, 7 minutes later a report was sent, and within 70 minutes the attack was over. Legitimate Gentoo developers were shut out for 5 days while the dust settled and repairs and analysis were completed.The attackers also attempted to add “rm -rf” commands to some repositories to cause user data to be recursively removed. As it turns out, this code was unlikely to be run because of technical precautions that were in place, but this wouldn’t have been obvious to the attacker.To read this article in full, please click here READ MORE HERE…

Read More
TrendMicro

Building a Profitable Security Services Offering Part 2 IT Security Features and Benefits Overview

Trend Micro is excited to partner with SPC International in this 5-part Blog, Webinar and Online Training Series; focused on Building a Profitable Security Services Offering for MSP Partners.  Through the series, SPC will teach you a selling process of leading with security, steps in growing your recurring managed security services revenue and provide you…
The post Building a Profitable Security Services Offering Part 2 IT Security Features and Benefits Overview appeared first on . Read More HERE…

Read More
TrendMicro

Zero Day Initiative: A 1H2018 Recap

When the Zero Day Initiative (ZDI) was formed in 2005, the cyber threat landscape was a bit different from what we see today. Threats were a little less sophisticated, but there was one thing that we saw then that we still see now: the shortage of cybersecurity professionals and researchers. The team decided that with…
The post Zero Day Initiative: A 1H2018 Recap appeared first on . Read More HERE…

Read More
TrendMicro

Zero-Day Coverage Update – Week of July 2, 2018

The General Data Protection Regulation (GDPR) has been up and running for a couple of months now and your organization is compliant. It’s time to take a little break – well, not so fast! Late last week, the State of California passed a new data privacy law called the California Consumer Privacy Act of 2018….
The post Zero-Day Coverage Update – Week of July 2, 2018 appeared first on . Read More HERE…

Read More