Why Cyber Change Outpaces Boardroom Engagement
Credit to Author: Bharat Mistry| Date: Fri, 04 Feb 2022 00:00:00 +0000
Organizations must avoid the mistakes of the past and build a security-by-design culture that permeates enterprise-wide.
Read moreCredit to Author: Bharat Mistry| Date: Fri, 04 Feb 2022 00:00:00 +0000
Organizations must avoid the mistakes of the past and build a security-by-design culture that permeates enterprise-wide.
Read moreCredit to Author: Jon Clay| Date: Fri, 04 Feb 2022 00:00:00 +0000
Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. Learn about the Samba vulnerability discovered by Trend Micro the White House’s warning of Russian hacks as tensions with Ukraine grow.
Read moreCredit to Author: Forward-Looking Threat Research Team| Date: Thu, 03 Feb 2022 00:00:00 +0000
How useful is the Codex code generator as a potential training tool?
Read moreCredit to Author: Jon Clay| Date: Fri, 28 Jan 2022 00:00:00 +0000
Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, read the third installment of Trend Micro’s Codex series. Also, read about the White House’s latest zero-trust approach to its cybersecurity strategy.
Read moreCredit to Author: Forward-Looking Threat Research Team| Date: Fri, 14 Jan 2022 00:00:00 +0000
In a series of blog posts, we explore different aspects of Codex and assess its capabilities with a focus on the security aspects that affect not only regular developers but also malicious users. This is the second part of the series.
Read moreCredit to Author: Jon Clay| Date: Fri, 14 Jan 2022 00:00:00 +0000
This week, read about how crucial it is for security teams to adopt an integrated approach to threat detection, such as remote control, and Congress’s plan to update the Federal Information Security Management Act (FISMA) for the first time in eight years.
Read moreCredit to Author: Forward-Looking Threat Research Team| Date: Fri, 07 Jan 2022 00:00:00 +0000
The first of a series of blog posts examines the security risks of Codex, a code generator powered by the GPT-3 engine.
Read moreCredit to Author: Jon Clay| Date: Fri, 07 Jan 2022 00:00:00 +0000
This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns to snoop on cameras and microphones.
Read moreCredit to Author: Jon Clay| Date: Fri, 17 Dec 2021 00:00:00 +0000
This week, read on Purple Fox’s infection chain observed by Trend Micro’s Managed XDR. Also, learn about the Log4j vulnerability that has the potential to cause ‘incalculable’ damage.
Read more