Trend Micro’s XDR offerings simplify and optimize detection and response

Trend Micro announced Worry-Free XDR: a new version of its XDR platform designed to extend the power of correlated detection and response beyond the endpoint for smaller businesses. This unmatched channel offering is available now as a standalone or managed solution tailored for SMBs. Today, 85% of organizations believe threat detection and response is getting…

Anyone who’s experienced a job interview knows that one of the keys to landing a position is answering the interview questions effectively and intelligently—without sounding like a robot. It’s no different for high-level security executives. In fact, given the importance of these positions and the need for security executives to think fast on their feet,…

In Plain Sight: Why Military Veterans Are a Great Fit for Cybersecurity Careers

Cybersecurity is a major concern for businesses worldwide. Just look at the results from “The Third Annual Study on the Cyber Resilient Organization” by IBM and the Ponemon Institute: The 2018 study found 65 percent of security professionals believe the severity of cyber attacks has increased, and only 29 percent have sufficient staffing to achieve…

March’s Top Cybersecurity News Stories: Responding to Attacks, Women in Security and a New Community for Security Pros

Despite Growing Threats, Many Organizations Still Unprepared The vast majority of organizations still lack a formal cybersecurity incident response plan (CSIRP) that’s applied consistently across the organization, according to a new report from the Ponemon Institute. Paradoxically, the institute’s third annual study on cyber resilience found that organizations feel much more positive about their readiness than they did last…

Know Your Security X’s and O’s: Your Cyberdefense Team Is Only as Good as Its Threat Intelligence

All of us in the security industry realize that we face a virtually insurmountable task to ensure that the data belonging to our organizations and customers is kept safe and secure. If you step back and think about it, the list of potential perpetrators is daunting in scope. It includes cybercriminals, hacktivists, foreign governments, and…

Transform Your Security Strategy to Avoid Digital Roadblocks

If you are a chief information security officer (CISO) in a midsized or large organization, you might be familiar with this problem: The marketing department just launched a campaign and is collecting customer information on an unverified partner system. In addition, another business unit is launching a digital sales channel and has established its own…