simply-security-logo

 

21 August 2019

  • How Do Threats Align With Detection And Solutions?

    There are many different threats targeting many different areas of a corporate network. Have you ever wondered how those threats are stopped? What threats impact which areas of a network? What technology detects and blocks those threats? I wanted to build an interactive graphic to answer those questions. This

    ...
  • XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR

    Real enterprises are messy places. One messy reality is that enterprises don’t manage all their endpoints. A smart colleague turned me onto using the % of endpoints and servers managed as a prime security metric. On one end of the spectrum are places like universities that maybe manage 10% of the endpoints on their

    ...
  • Innovate or Die?

    The recent series of IT acquisitions and IPOs highlight a simple economic fact: companies that fail to keep up with the fast-paced innovation of technology can easily become targets for acquisition. Mark Twain put it this way: History doesn’t repeat itself, but it rhymes. As a former Gartner analyst, I find it

    ...
  • This Week in Security News: Phishing Campaigns and a Biometric Data Breach

    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about ever-increasing amounts of phishing campaigns and how Trend Micro caught 2.4 million attacks of this type — a 59% increase from 1.5 million in

    ...
  • Customer Perspective: Catching the thief lurking in the shadows with EDR and MDR

    A guest blog by Ian Loe, Senior Vice President, Cybersecurity, NTUC Enterprise Co-operative Limited News flash: aided by time, persistence and smarts, advanced cybersecurity felons are leapfrogging traditional security systems to compromise confidential data. Realising this, we at NTUC Enterprise have been looking into

    ...
  • Cyberattack Lateral Movement Explained

    [Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement. And the reason why I want to tackle this today is because I’ve had some conversations in the last few days that have really kind of hit

    ...
  • This Week in Security News: Ransomware Campaigns and Cryptocurrency Miners

    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about continuing cybersecurity attacks targeting small governments. Also, read how XDR, Trend Micro’s newest solution, is more comprehensive than EDR and

    ...
  • This Week in Security News: Ransomware Campaigns and Cryptocurrency Miners

    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about continuing cybersecurity attacks targeting small governments. Also, read how XDR, Trend Micro’s newest solution, is more comprehensive than EDR and

    ...
  • Why XDR Is A Big Deal, and Is Different from SIEM and Platforms

    In Jon Clay’s post, he does a great job of explaining the evolution from EDR to XDR. In short, he explained that Endpoint Detection and Response (EDR) is great, but that having sources of information beyond endpoint is better. The ‘X’ in XDR is essentially ‘many’ or whatever we can add to provide a

    ...
  • XDR Needs Network Data and Here’s Why

    As we’ve discussed in previous blogs, XDR is a better way to detect attacks within a network since it is able to coordinate and collaborate threat intelligence and data across multiple threat vectors, including endpoint (including mobile and IIoT), server, network, messaging, web, and cloud. In this blog I want to

    ...