When and how to report a breach: Data breach reporting best practices

One day you go into work and the nightmare has happened. The company has had a data breach. This scenario plays out, many times, each and every day, across all…

Hacker Infrastructure and Underground Hosting 101

Trend Micro – Trend Micro – Cybercriminals are in the business of making money at their victims’ expense. Unfortunately, this involves a great deal of stolen money and countless victims…

How artificial intelligence is changing social engineering

When I was first learning about social engineering, I remember listening to a recording of different phone calls to Starbucks. I was astounded how easy it was to obtain sensitive…

Top cyber security risks in healthcare [updated 2020]

The healthcare industry is a prime target for cybercriminals. Stolen protected health information (PHI) is worth hundreds, even thousands of dollars on the black market. For cybercriminals, the healthcare industry…

Keeping Alexa out of the boardroom (and the bedroom office): IoT security tips for remote employees

Introduction  I can’t help myself. I find myself liking Alexa. She/he/it isn’t exactly a friend, but I can play music and find out the weather and do all sorts of…

Network traffic analysis for IR: Data exfiltration

Introduction Understanding network behavior is a prerequisite for developing effective incident detection and response capabilities. ESG research has found that 87 percent of companies use Network Traffic Analysis (NTA) tools…

Strategic Guidance for CISOs on Cybersecurity

Trend Micro – Trend Micro – Cybersecurity challenges For most CISOs, job responsibilities are clear, but executing in all three areas can be extremely difficult due to a host of…

The Most Vulnerable and Hackable Medical Devices

  The Internet of Things (IoT) adds convenience and capabilities in both personal and professional applications. Smart device usage in the medical field is growing by leaps and bounds: in…

How to Comply with HIPAA Regulations – 10 Steps

There is a tremendous amount of data in the world of healthcare. That data includes personal healthcare information (PHI), which is regulated by the Health Insurance Portability and Accountability Act…

Research to Power Your Cybersecurity Strategy

Trend Micro – Trend Micro – Vulnerabilities and ExploitsAs the industry’s number one public discloser of vulnerabilities, the Trend Micro Zero Day Initiative has discovered and disclosed more than 4,500…