The Internet of Things (IoT) offers tremendous value to organisations, their customers and employees, driving business agility, productivity, cost reductions and much more. That’s why the total number of connected things is predicted to top 20 billion by 2020. Unfortunately, this IoT explosion also creates unique opportunities for cybercriminals. Of these, attacks which impact the physical world are arguably the most serious, potentially leading to costly service disruption and even loss of life.
That’s why we’ll be sharing some key best practice tips with attendees at Infosecurity Europe next month on how organisations can mitigate the risks of IoT-powered cyber-physical attacks. Continue reading →
The UK is facing a bigger threat from cyberspace now than ever before: that was the message from the National Cyber Security Centre (NCSC) this week as it launched its first major report into the threat landscape. Produced in association with the National Crime Agency (NCA), it also featured input from Trend Micro. We’re pleased to be working side-by-side with law enforcement and government to help protect citizens and organisations — because only with collaboration across sectors can we offer truly effective threat defence against cybercrime and nation state hacking. Continue reading →
There are few more exciting frontiers of the Internet of Things (IoT) than connected cars. Gartner predicts that there will be 61 million new vehicles with built-in connectivity manufactured by 2020. But as we drive ever closer to a future where autonomous vehicles are a commonplace sight, we must be alert to the implications of cyber-threats in this domain. Already, real-world attacks and demonstrations by researchers have shown the potential for serious disruption.
That’s why Trend Micro has announced a major new partnership with Panasonic which will tap the expertise of both companies to create a leading cybersecurity solution for connected cars. Continue reading →
CISOs are regularly bombarded with breaking news on advanced nation state espionage campaigns and sophisticated cybercrime heists. From the ongoing machinations of the Kremlin-linked Pawn Storm group to the recently uncovered cyber-bank raid by the MoneyTaker gang, these threats tend to grab all the headlines. But IT security leaders will know that some of their biggest problems come from legacy threats: what we’re calling “Throwhacks”.
Unlike the popular social media trend “Throwback Thursday”, there’s nothing entertaining about this list of legacy security challenges. Organisations need to get a handle on these threats before they start worrying about hackers armed with advanced AI tools.Continue reading →