by Ross Baker
The current pandemic has done little to reduce the daily workload of most CISOs. In fact, with cyber-criminals ramping up social engineering efforts against home workers and attacks on remote access infrastructure, your spare time may well be more precious than it’s ever been. That’s why Trend Micro has created Perspectives, a jam-packed two-hour virtual event focused around the topic of securing digital transformation.
Experts from AWS, Azure, Trend Micro, IDC and some of our biggest customers will come together to share their insight on Thursday, June 25.
by Bharat Mistry
The cybercrime economy is one of the runaway success stories of the 21st century — at least, for those who participate in it. Estimates claim it could be worth over $1trillion annually, more than the GDP of many countries. Part of that success is due to its ability to evolve and shift as the threat landscape changes. Trend Micro has been profiling the underground cybercrime community for several years. And over the past five, we’ve seen a major shift to new platforms, communications channels, products and services, as trust on the dark web erodes and new market demands emerge.
Unfortunately, we expect the current pandemic to create yet another evolution, as cyber-criminals look to take advantage of new ways of working and systemic vulnerabilities.
by Bharat Mistry
For the past 12 years, Verizon has been publishing its Data Breach Investigations Report (DBIR). Whilst not the final word on the threat landscape, it always offers some interesting insight into current trends — this year distilled from over 32,000 analysed “incidents” and nearly 4,000 breaches worldwide. That’s why it was interesting to note the uptick in cloud-based threats stemming from external malice and insider error revealed in this year’s report.
The good news is that Trend Micro helps global organisations mitigate both types of cyber-risk; providing peace-of-mind to support employee productivity in a current climate of mass remote working.
by William Malik
“Alexa, turn on the TV.”
”Get it yourself.”
This nightmare scenario could play out millions of times unless people take steps to protect their IoT devices. The situation is even worse in industrial settings. Smart manufacturing, that is, Industry 4.0, relies on tight integration between IT systems and OT systems. Enterprise resource planning (ERP) software has evolved into supply chain management (SCM) systems, reaching across organizational and national boundaries to gather all forms of inputs, parting out subcomponent development and production, and delivering finished products, payments, and capabilities across a global canvas.
Each of these synergies fulfills a rational business goal: optimize scarce resources across diverse sources; minimize manufacturing, shipping, and warehousing expense across regions; preserve continuity of operations by diversifying suppliers; maximize sales among multiple delivery channels. The supply chain includes not only raw materials for manufacturing, but also third party suppliers of components, outsourced staff for non-core business functions, open source software to optimize development costs, and subcontractors to fulfill specialized design, assembly, testing, and distribution tasks. Each element of the supply chain is an attack surface.