Tag Archives: Research

Why tool sprawl could be undermining your threat detection and response efforts

by Simon Walsh

IT security teams have always been on the back foot against agile and determined adversaries. But the concern among CISOs is that the pendulum has swung even further away from them over the past couple of years. Trend Micro alone blocked nearly 63 billion threats last year. This puts tremendous pressure on the security operations (SecOps) analysts tasked with detection and response. And as a new study from Trend Micro reveals, they’re reaching breaking point.

A major part of the problem appears to be a historic over-investment in monitoring tools. If you can’t work from a single version of the truth, prioritising threat alerts effectively is going to be near-impossible.

Continue reading

On the frontline: revealing the personal and professional challenges facing SecOps teams

by Bharat Mistry

It’s easy to forget that cybersecurity is fundamentally about people. Attacks are launched by threat actors, phishing emails are opened by employees, and it is your SecOps team that has to try and detect and respond to increasing volumes of these threats. As good as technology systems are, we haven’t got to the point where all of this defensive work can be automated. So what happens when your most precious resource, your security team, feels overwhelmed by their workload?

According to new research from Trend Micro, it’s a question an increasing number of organisations are facing—but few have a satisfactory answer to. The reality is that under pressure SecOps teams need better tools to correlate and prioritise alerts, so they can work more efficiently.

Continue reading

Trend Micro Research Identifies Critical Industry 4.0 Attack Methods

by William Malik

“Alexa, turn on the TV.”
”Get it yourself.”

This nightmare scenario could play out millions of times unless people take steps to protect their IoT devices. The situation is even worse in industrial settings. Smart manufacturing, that is, Industry 4.0, relies on tight integration between IT systems and OT systems. Enterprise resource planning (ERP) software has evolved into supply chain management (SCM) systems, reaching across organizational and national boundaries to gather all forms of inputs, parting out subcomponent development and production, and delivering finished products, payments, and capabilities across a global canvas.

Each of these synergies fulfills a rational business goal: optimize scarce resources across diverse sources; minimize manufacturing, shipping, and warehousing expense across regions; preserve continuity of operations by diversifying suppliers; maximize sales among multiple delivery channels. The supply chain includes not only raw materials for manufacturing, but also third party suppliers of components, outsourced staff for non-core business functions, open source software to optimize development costs, and subcontractors to fulfill specialized design, assembly, testing, and distribution tasks. Each element of the supply chain is an attack surface. 

Continue reading

Business Process Compromise: European Firms Struggle to Tackle a Misunderstood Threat

by Bharat Mistry

Business Process Compromise (BPC) cyber-attacks are not often covered in the media. Their distant relative — the similarly sounding Business Email Compromise (BEC) — tends to get most of the billing, especially after the FBI branded it the most costly threat of 2018. But the truth is that this broad category of attacks is a major threat to organisations. Last year we revealed that 43% of US and European firms had been impacted by BPC.

Continue reading