by Dimitris Rodoplou
With a history dating back over three decades, Coillte is today the custodian of over 440,00 hectares of Ireland’s forest lands. However, with turnover exceeding €320 million in 2019, its three thriving businesses are also an attractive target for cyber-attackers.
When existing security functionality had to be switched off due to performance issues, the firm’s Infrastructure Architect, Marc Walsh, knew it was time to find a new provider. That’s when he turned to Trend Micro Apex One.
by Camilla Currin
We’ve heard a lot about the acceleration of digital transformation over the course of the past year. McKinsey has claimed that organisations which used to consider digital strategy in “one- to three-year phases” have shifted to doing the same in just days or weeks. At Trend Micro we wanted to find out more, specifically whether these efforts were being managed in a secure manner.
What we found in our interviews with 2,500+ IT decision makers worldwide was revealing. While digital transformation has certainly increased during the pandemic, their understanding of how to mitigate risk in the cloud has not. This threatens to leave many organisations exposed to serious reputational and financial damage.
by Gurmail Singh
In the previous part of this three-part series, we explained how organisations are increasingly exposed to financial and reputational risk through unpatched vulnerabilities. The bad news is that these flaws are being found and exploited on an ever-growing scale, thanks to the work of legitimate researchers on the one hand and cybercrime groups and nation state actors on the other. Fail to manage this risk effectively and your organisation may suffer a major data breach and/or ransomware-related outage.
by Bharat Mistry
If nothing else, the past year has shown us that the traditional network perimeter as we knew it is now gone. Today’s organisations run a complex blend of remote working endpoints, cloud applications and servers alongside their traditional on-premises assets. This inevitably creates new security and compliance challenges, because all the operating systems and software that run on these endpoints need continual patching against new malware exploits. Fail in this, and CISOs run the risk of a potentially serious security incident that could lead to widespread disruption and financial and reputational damage.
The problem is that patching is not as easy as it sounds. This is where virtual patching can help.