Content added to Folio

Research, News, and Perspectives

Add Filters
Filter by:
Midyear 2021 Cybersecurity Landscape Review: Attacks From All Angles Abound
Cyber Threats

Midyear 2021 Cybersecurity Landscape Review: Attacks From All Angles Abound

Here is a rundown of data related to the crucial security issues that enterprises faced during this period, as examined in our report, “Attacks From All Angles: 2021 Midyear Cybersecurity Report.”

September 16, 2021
Cyber Threats

This Week in Security News – October 15, 2021

Actors target Huawei Cloud using upgraded Linux malware, 7-Eleven breached customer privacy by collecting facial imagery without consent and more.

Expert Perspective Oct 15, 2021

Save to Folio

Expert Perspective Oct 15, 2021

Save to Folio

Exploits & Vulnerabilities

Security Risks with Private 5G in Manufacturing Companies Part. 2

We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry. The option of Private 5G lets private companies and local governments have their own telecom infrastructures. However, the "democratisation of communications" entails its own risks that have not yet been made clear. To identify these risks, Trend Micro performed tests using an environment modelled after a steelworks with 5G equipment.

Research Oct 15, 2021

Save to Folio

Research Oct 15, 2021

Save to Folio

Ransomware

Ransomware Operators Found Using New "Franchise" Business Model

We found a relatively new and interesting ransomware operation that takes inspiration from franchise business models. It seems that the operators are rebranding a "supplier" ransomware before deployment instead of simply distributing it under the original name.

Research Oct 15, 2021

Save to Folio

Research Oct 15, 2021

Save to Folio

Compliance & Risks

Secure Manufacturing on Cloud, Edge and 5G (Download PDF)

This e-book provides you with insight into system changes brought on by factory production processes and explains how the cloud and 5G have transformed smart factories. You’ll also receive a look into how we map the attack scenario so you can identify the type of risks that lie throughout the entire system.

Security Strategies Oct 13, 2021

Save to Folio

Security Strategies Oct 13, 2021

Save to Folio

Compliance & Risks

New Bill to Require Cyber Attack Reporting in the US

The Cyber Incident Notification Act of 2021 would also require CISA to launch a program that would notify organisations of various vectors that malicious actors exploit.

Latest News Oct 13, 2021

Save to Folio

Latest News Oct 13, 2021

Save to Folio

Exploits & Vulnerabilities

October Patch Tuesday: 3 Critical Bulletins Among 71

The October Patch Tuesday maintains the relatively peaceful streak from previous months with only 3 bulletins rated as Critical amongst 71 new vulnerabilities.

Research Oct 13, 2021

Save to Folio

Research Oct 13, 2021

Save to Folio

Cyber Threats

Minimize SecOps Risk with Less Tools and More Security

Security leaders are seeking new ways to minimise SecOps security monitoring tools while increasing efficiency for SecOps teams. Read this article to learn more.

Expert Perspective Oct 12, 2021

Save to Folio

Expert Perspective Oct 12, 2021

Save to Folio

Privacy & Risks

Honda to Start Selling Smart Car Data

The auto giant is just one of many auto companies monetising smart car data, creating a new industry set to be worth $400 billion by 2030.

Latest News Oct 11, 2021

Save to Folio

Latest News Oct 11, 2021

Save to Folio

Compliance & Risks

Expanded Cloud Misconfiguration & IaaS Security

Cloud One – Conformity has expanded its support for multi-clouds and Terraform users to add even more configuration checks so cloud projects are built on a foundation of best practice security and compliance.

Security Strategies Oct 11, 2021

Save to Folio

Security Strategies Oct 11, 2021

Save to Folio