Cyber insurance requirements: What’s in store for 2024

Credit to Author: Vince Kearns| Date: Tue, 09 Jan 2024 00:00:00 +0000

As the threat landscape evolves and the cost of data breaches increase, so will cyber insurance requirements from carriers. Cyber Risk Specialist Vince Kearns shares his 4 predictions for 2024.

Read more

Modern Attack Surface Management (ASM) for SecOps

Credit to Author: Alifiya Sadikali| Date: Thu, 14 Dec 2023 00:00:00 +0000

Today’s attack surface requires modern processes and security solutions. Explore the tenants of modern attack surface management (ASM) and what SecOps need to look for in an ASM solution.

Read more

Modern Attack Surface Management for Cloud Teams

Credit to Author: Alifiya Sadikali| Date: Mon, 27 Nov 2023 00:00:00 +0000

Today’s attack surface requires modern processes and security solutions. Explore the tenants of modern attack surface management (ASM) and what Cloud teams need to look for in an ASM solution.

Read more

Implementing Zero Trust: 5 Key Considerations

Credit to Author: Alifiya Sadikali| Date: Tue, 07 Nov 2023 00:00:00 +0000

When implementing a Zero Trust strategy and selecting a solution to safeguard your company against cyber risk, there are many factors to consider. Five key areas include Visibility and Analytics, Automation and Orchestration, Central Management, Analyst Experience, and Pricing Flexibility and Transparency.

Read more

Strategic Tips to Optimize Cybersecurity Consolidation

Credit to Author: Greg Young| Date: Thu, 26 Oct 2023 00:00:00 +0000

Say goodbye to security silos. Organizations are eager to take advantage of cybersecurity consolidation and make their security environments more manageable. Evolving incrementally and adopting a platform that supports third-party integrations are key to reducing cybersecurity complexity.

Read more

Cybersecurity Awareness Month 2023: 4 Actionable Tips

Credit to Author: Greg Young| Date: Tue, 26 Sep 2023 00:00:00 +0000

Make Cybersecurity Awareness Month a year-long initiative with these three actionable security tips to reduce cyber risk across the attack surface.

Read more

Protect CNC Machines in Networked IT/OT Environments

Credit to Author: William Malik| Date: Tue, 19 Sep 2023 00:00:00 +0000

Networking IT/OT environments is a bit like walking a tightrope, balancing the pursuit of intelligence and efficiency against the risks of exposing OT systems to the wider world. Trend Micro recently teamed up with global machine tool company Celada to identify specific risks associated with industrial CNC machines—and how to mitigate them.

Read more