Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Trend Micro CSO Warns of the Risks of Digital Extortion

    By
    Sean Michael Kerner
    -
    July 5, 2018
    Share
    Facebook
    Twitter
    Linkedin

      After a 20-year career in the U.S Secret Service, Ed Cabrera joined Trend Micro in 2015, where he is now the chief cybersecurity officer, working with organizations to improve cybersecurity.

      Among the multiple challenges enterprises around the world face are ransomware and business email compromise (BEC) attacks, which represent more immediate risk than other forms of attacks that are not quickly monetized by attackers. In a video interview with eWEEK, Cabrera provides his insights on the modern landscape of digital extortion and what organizations can do to mitigate some of the risks.

      “Ransomware attacks have become much more pervasive and impactful,” he said.

      Ransomware, according to Cabrera, is part of a larger trend, which he refers to as digital extortion. Such attacks are not limited to enterprises but can also affect industrial facilities as well and have a more immediate impact than regular malware. Digital extortion attacks are a real threat to operations, he said.

      “These types of attacks have changed the landscape. They are able to monetize attacks within minutes or hours, unlike a traditional data breach,” Cabrera said.

      The immediate nature of digital extortion attacks means that organizations need to prepare and respond more quickly than with a non-extortion type of data breach, he said.

      Business Email Compromise

      BEC attacks, in which attackers trick organizations into paying fraudulent invoices, are also becoming increasingly more common. A particular challenge with BEC attacks is that they typically do not have malicious links or malware, but rather rely on social engineering to get victims.

      “[BEC] is an incredibly lucrative attack, but it’s hard to defend against,” Cabrera said.

      Trend Micro has a product called Writing Style DNA that aims to help defend against BEC, by providing organizations with artificial intelligence-powered technology to spot email fraud. Cabrera said Trend Micro also backs the DMARC (Domain-based Message Authentication Reporting and Conformance) standard, which is an effort to help validate and improve email authenticity. While DMARC can help to combat BEC, Cabrera said that it’s just one element to help limit risks.

      Beyond just technology, Cabrera said training and awareness play a role in combating threats like BEC as well. In addition, simulation exercises that help educate and inform regular users and executives are also important, he said.

      Overall, Cabrera said that as an organization, Trend Micro is always looking at the big picture, correlating and understanding threats from around the world. While individual threats do represent risk to organizations, a core part of Cabrera’s job is to take a macro view of the cybersecurity landscape, he said.

      “[What] I look at and think about is not necessarily about one individual attack. It’s about looking at the macro level and what kind of campaigns are going on, where are they going next and what can we do to get ahead of them,” he said.

      Watch the full video interview with Ed Cabrera above.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×