Trend Micro’s XDR offerings simplify and optimize detection and response

Trend Micro announced Worry-Free XDR: a new version of its XDR platform designed to extend the power of correlated detection and response beyond the endpoint for smaller businesses. This unmatched channel offering is available now as a standalone or managed solution tailored for SMBs. Today, 85% of organizations believe threat detection and response is getting…

Exonar, has today published research revealing that 94 percent of IT pros have experienced a data breach, and an overwhelming majority (79 percent) are worried that their current organization could be next. The survey of 500 IT professionals found that when it comes to cybersecurity, employee data breaches are seen as the biggest risk to…

Recommendations to enhance subscriber privacy in 5G

There are clear benefits of 5G SIM capabilities to protect the most prominent personal data involved in mobile communications, according to the Trusted Connectivity Alliance. Addressing privacy risks The IMSI, known as a Subscription Permanent Identifier (SUPI) in 5G, is the unique identifier allocated to an individual SIM by an MNO. Despite representing highly personal…

2020 trends in SOX compliance

SOX & Internal Controls Professionals Group released a survey which measures the costs, execution, challenges and priorities faced by companies that comply with the Sarbanes-Oxley Act (SOX). SOX compliance trends “In its fifth year, our survey reflects the broad experience of SOX professionals over time and presents a balanced perspective of the current state of…

Black Duck has always recognized the importance of prioritizing open source security tasks by providing several key data points to help customers focus on what’s most critical. After all, with over 40 new software vulnerabilities being uncovered every day, it’s easy to become overwhelmed. In addition to offering detailed descriptions, expanded severity scoring, exploit information,…

The information security industry frequently utilizes the phrase “people, processes and technology” (PPT) to describe a holistic model of securing the business. But though this phrase is repeated ad nauseum, we seem to have forgotten one of those three primary pillars: people. In an effort to secure things technically, we prioritize the protection of our…