2019 Security Predictions Report Released

What Makes For Really Good Security Predictions Each year Trend Micro releases its annual Security Predictions Report. Good security predictions are very difficult to develop, and companies and consumers need to be selective about the security advice they take. What makes a good security prediction? Four key aspects: 1. It is the prime directive that…
The post 2019 Security Predictions Report Released appeared first on . Read More HERE…

Read more

What Happens When Victims Pay Ransomware Attackers?

For many hackers around the globe, ransomware infections have become a lucrative business. Although these types of malware samples have been around for years now, they continue to spur success – and high monetary profits – for attackers. In fact, according to a statement from U.S. Deputy Attorney General Rod Rosenstein during the 2017 Cambridge…
The post What Happens When Victims Pay Ransomware Attackers? appeared first on . Read More HERE…

Read more

This Week in Security News: Security and Privacy Issues

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, understand how Trend Micro™ Deep Security™ service will be integrating with AWS Security Hub. Also, learn how to prevent risks and secure machine-to-machine communications over Message Queuing Telemetry Transport and…
The post This Week in Security News: Security and Privacy Issues appeared first on . Read More HERE…

Read more

Securing Smart Manufacturing with Connected Threat Defense

By David Tay, the CIO of Beyonics You’d be hard pushed to find any organization today not involved in digital transformation projects. But the manufacturing sector was arguably one of the first to the game. Back in 2011, the German government first coined the term Industry 4.0 to describe the opportunities stemming from use of emerging…
The post Securing Smart Manufacturing with Connected Threat Defense appeared first on . Read More HERE…

Read more

30 Years of Trend Micro

This year marks 30 years of Trend Micro. That’s three decades of working to make the world safe for exchanging digital information in a constantly changing technology and cyber threat environment. Our founders often reference the humble beginnings of the company – starting from a garage in California – to highlight just how far we’ve…
The post 30 Years of Trend Micro appeared first on . Read More HERE…

Read more

Parlez-vous Machine?

Have you ever heard of the MQTT or CoAP protocols? No? Well the device on your wrist, and so many devices around you, could be using them right now. MQTT and CoAP are machine-to-machine or M2M protocols. With the rise of the internet of things (IoT) and operational technology (OT), there’s increased security focused on…
The post Parlez-vous Machine? appeared first on . Read More HERE…

Read more

This Week in Security News: Ethics and Law in the Dark Web

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.  This week, learn how Trend Micro software can aid in safely securing containers on the AWS Cloud. Also, how the dark web has become a new advertising medium for…
The post This Week in Security News: Ethics and Law in the Dark Web appeared first on . Read More HERE…

Read more

AWS Security Hub and Deep Security

One of the biggest challenges in maintaining your security posture is visibility. You have security controls deployed throughout the stack, and each fo these tools is generating its own set of data points and has its own view of your deployment. Managing the multitude of alerts and events from these tools can quickly get overwhelming….
The post AWS Security Hub and Deep Security appeared first on . Read More HERE…

Read more

Today’s Data Breach Environment: An Overview

By now, companies and consumers alike are well aware of the threat of a data breach. Large and small businesses across every sector have been targeted, and many customers are now familiar with the notification that their username, password or other details might have been compromised. The unfortunate fact is that, despite efforts on the…
The post Today’s Data Breach Environment: An Overview appeared first on . Read More HERE…

Read more

Securing Containers in The AWS Cloud with Trend Micro

Rapid adoption of containers is changing the way that businesses build their applications. Services like Amazon ECS, Amazon EKS, and AWS Fargate let builders focus on solving business problems instead of managing infrastructure. But the move to containers also requires a shift in how you approach security. Dynamic environments require security that integrates with CI/CD…
The post Securing Containers in The AWS Cloud with Trend Micro appeared first on . Read More HERE…

Read more