3 Reasons MSPs Must Evolve Beyond Endpoint Detection and Response

Credit to Author: Trend Micro| Date: Mon, 18 Nov 2019 19:48:17 +0000

Endpoint protection is a critical component of a security strategy. But it’s not enough. Today’s threat landscape is so wide and varied, it requires round-the-clock monitoring, full visibility into IT environments and a multilayered approach to keep hackers at bay. For MSPs, this creates a sizable opportunity to protect clients with a comprehensive security strategy…

The post 3 Reasons MSPs Must Evolve Beyond Endpoint Detection and Response appeared first on .

Read more

There is a Skills Shortage, But it isn’t Your Real Problem

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Thu, 14 Nov 2019 14:43:50 +0000

During my undergraduate days, I recall hearing that the Bell System was slow to deploy automated dialing. While smaller local phone companies allowed callers to dial a number directly from their phone, the Bell system continues to rely on switchboard operators into the 1930s. In fact, early phones did not have numbers to dial at…

The post There is a Skills Shortage, But it isn’t Your Real Problem appeared first on .

Read more

This Week in Security News: Trend Micro Launches its XDR Center in India and EU Reports 5G Cybersecurity Risks

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 18 Oct 2019 13:03:42 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Trend Micro’s new XDR Center in India that will help solve data sovereignty issues. Also, read about 5G network software use being a top security…

The post This Week in Security News: Trend Micro Launches its XDR Center in India and EU Reports 5G Cybersecurity Risks appeared first on .

Read more

Why Should CISOs Care About XDR?

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Fri, 20 Sep 2019 14:40:18 +0000

We have been collectively saying in our industry for the last 15-20 years that a layered approach to your security stack is a “best practice,” but as with all best practices, these are ideals rather than reality for so many charged with protecting their organizations. The vast majority of CISOs are saddled with legacy operating…

The post Why Should CISOs Care About XDR? appeared first on .

Read more

The Sky Has Already Fallen (you just haven’t seen the alert yet)

Credit to Author: Rik Ferguson (VP, Security Research)| Date: Wed, 21 Aug 2019 14:50:09 +0000

Of course, the much-touted “Cybersecurity Skills Shortage” isn’t news to anyone, or it shouldn’t be. For seven or more years, journalists, industry analysts and practitioners have been opining about it one way or another. Analyses and opinions vary on how we have reached this impasse, my own being that this is a largely self-inflicted crisis…

The post The Sky Has Already Fallen (you just haven’t seen the alert yet) appeared first on .

Read more

XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Mon, 19 Aug 2019 13:22:58 +0000

Real enterprises are messy places. One messy reality is that enterprises don’t manage all their endpoints. A smart colleague turned me onto using the % of endpoints and servers managed as a prime security metric. On one end of the spectrum are places like universities that maybe manage 10% of the endpoints on their network….

The post XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR appeared first on .

Read more

Cyberattack Lateral Movement Explained

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Mon, 12 Aug 2019 15:11:56 +0000

[Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement. And the reason why I want to tackle this today is because I’ve had some conversations in the last few days that have really kind of hit that…

The post Cyberattack Lateral Movement Explained appeared first on .

Read more

Will XDR Improve Security?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Mon, 29 Jul 2019 14:06:36 +0000

Cybercriminals and malicious hackers have been shifting their tactics, techniques, and procedures (TTPs) to improve their ability to infiltrate an organization and stay under the radar of security professionals and solutions. Moving to more targeted attack methods appears to be a mainstay among threat actors, which requires organizations to improve their visibility into the entire…

The post Will XDR Improve Security? appeared first on .

Read more