The EU General Data Protection Regulation (GDPR) is one of the most important and far-reaching pieces of legislation ever to come out of Brussels. That’s part of the reason so much has already been written about it. But before you reach GDPR-saturation point, consider new findings from a comprehensive new Trend Micro study which has revealed a worrying lack of leadership from senior executives when it comes to compliance efforts.
More concerning still, three-quarters (73%) of UK IT bosses we spoke to weren’t even aware of the potentially huge fines in store for non-compliance. With a 25 May 2018 deadline fast-approaching, time is running out. Continue reading →
Did you know that by 2018, around 1.3 million industrial robots will be set to work in factories around the world? It’s an industry estimated to be worth $32 billion by next year, helping to power a fourth industrial revolution built on smart factories and automated processes. Yet as these robots become increasingly important in a range of industries, they’ll inevitably begin to pique the interest of cybercriminals and nation state hackers. The question is, just how exposed are they to cybersecurity threats, and what can be done about it?
That’s what Trend Micro set out to answer for the first time in a ground-breaking new report: Demonstrating Industrial Robot Attacks in Today’s Smart Factories. Its findings confirm Trend Micro as a leader in industrial IoT security, a message we’ll be taking to the Infosecurity Europe show in June. Continue reading →
Trend Micro blocked an astonishing 81+ billion threats for customers in 2016, according to our newly released TrendLabs 2016 Security Roundup. If any stat speaks of the scale of the challenge facing organisations from online attackers – and the need for comprehensive multi-layered protection – it’s this one. Ransomware unsurprisingly led the way last year, with a 752% increase in new malware families discovered. But it’s Business Email Compromise (BEC) that potentially threatens to cause more problems going forward. Continue reading →
Indicators of compromise (IOCs) are an incredibly important forensic artifacts which, as the name suggests, are used in incident response and threat research to discover if a system has been compromised. They come in various forms, for example, unusual outbound network traffic, an MD5 file in a temporary directory, or even log-in irregularities. One class of IOCs so far resistant to detection by traditional methods relates to the use of external content in web-based attacks.
At Black Hat Europe earlier today, Trend Micro senior security researcher Marco Balduzzi, explained how a new machine learning approach can reap fantastic results for early detection of such threats. Continue reading →