What’s Next in Security from Microsoft

Credit to Author: Pooja Parab| Date: Thu, 10 Feb 2022 17:00:00 +0000

On February 24, 2022, at the What’s Next in Security from Microsoft digital event, you’ll learn how a comprehensive approach to security will give you the confidence to take appropriate business risks that move your company forward. At this event, Vasu Jakkal, Microsoft Corporate Vice President of Security, Compliance, and Identity, and other security experts will share exciting new innovations that help reduce the risk from the latest threats.

The post What’s Next in Security from Microsoft appeared first on Microsoft Security Blog.

Read more

Hackers Expand Their Repertoire as Trend Micro Blocks 52 Billion Threats in 2019

Credit to Author: Trend Micro| Date: Tue, 25 Feb 2020 15:56:29 +0000

Variety is welcome in most walks of life, but not when it comes to the threat landscape. Yet that is unfortunately the reality facing modern cybersecurity professionals. As Trend Micro’s 2019  roundup report reveals, hackers have an unprecedented array of tools, techniques and procedures at their disposal today. With 52 billion unique threats detected by…

The post Hackers Expand Their Repertoire as Trend Micro Blocks 52 Billion Threats in 2019 appeared first on .

Read more

A week in security (February 10 – 16)

Credit to Author: Malwarebytes Labs| Date: Tue, 18 Feb 2020 16:40:45 +0000

A roundup of the previous week’s security news, including Malwarebytes’ release of the 2020 State of Malware Report, online dating woes, Emotet infection vectors, ransomware attacks, and more.

Categories:

Tags:

(Read more…)

The post A week in security (February 10 – 16) appeared first on Malwarebytes Labs.

Read more

A week in security (December 30 – January 5)

Credit to Author: Malwarebytes Labs| Date: Mon, 06 Jan 2020 17:20:25 +0000

A roundup of the previous week’s most notable security stories and events, including new web skimmer techniques, an explanation of edge computing, and more.

Categories:

Tags:

(Read more…)

The post A week in security (December 30 – January 5) appeared first on Malwarebytes Labs.

Read more

Why Should CISOs Care About XDR?

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Fri, 20 Sep 2019 14:40:18 +0000

We have been collectively saying in our industry for the last 15-20 years that a layered approach to your security stack is a “best practice,” but as with all best practices, these are ideals rather than reality for so many charged with protecting their organizations. The vast majority of CISOs are saddled with legacy operating…

The post Why Should CISOs Care About XDR? appeared first on .

Read more

Beyond The Standard CISO Cloud Security Guide

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Thu, 19 Sep 2019 13:53:11 +0000

Verizon recently released a 5 step process for evaluating cloud security products and services to inform purchase decisions. That’s a fantastic tool for buyers to have. This is especially helpful because cloud discussions are almost always driven by business objectives to satisfy a cost and or productivity problem. The CISO has to come in and…

The post Beyond The Standard CISO Cloud Security Guide appeared first on .

Read more

Making the case: How to get the board to invest in higher education cybersecurity

Credit to Author: Joan Goodchild| Date: Wed, 28 Aug 2019 17:31:00 +0000

CISOs working in institutions of higher learning have their own considerations when communicating with the board about risk management. One of the top security officials at Boston College offers his takeaway on what it takes to get board buy-in on campus.

Categories:

Tags:

(Read more…)

The post Making the case: How to get the board to invest in higher education cybersecurity appeared first on Malwarebytes Labs.

Read more

Making the case: How to get the board to invest in government cybersecurity

Credit to Author: Joan Goodchild| Date: Thu, 01 Aug 2019 16:00:00 +0000

CISOs are increasingly tapped to communicate with the board and executive management about security. Here’s what government officials need to know for success.

Categories:

Tags:

(Read more…)

The post Making the case: How to get the board to invest in government cybersecurity appeared first on Malwarebytes Labs.

Read more