TrendMicro

TrendMicro

Ransomware Threat Continues: How Infections Take Place

If cybersecurity consultants and IT admins have learned anything of the current threat environment, it’s that ransomware will continue to be a pervasive and dangerous threat to individual users, enterprises and organizations at large. When they first emerged, these infections were unlike anything that tech experts had ever seen, combining strong encryption and blackmail tactics…
The post Ransomware Threat Continues: How Infections Take Place appeared first on . Read More HERE…

Read More
TrendMicro

This Week in Security News: Toll Fraud & Small Business Struggles

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn why telecommunications fraud has turned into a multi-billion euro criminal industry. Also, understand what cybersecurity struggles small businesses still face after the NIST Small Business Cybersecurity Act…
The post This Week in Security News: Toll Fraud & Small Business Struggles appeared first on . Read More HERE…

Read More
TrendMicro

The Patching Problem: Best Practices for Maintaining Up-to-Date Systems

“Update ready to be installed.” IT teams and business stakeholders are probably familiar with this notification, or something like it. After all, software updates are nothing new: Whenever a vendor makes improvements or includes new capabilities on a previously-released platform, it comes with a software update. But boosting existing features aren’t the only reason that patching…
The post The Patching Problem: Best Practices for Maintaining Up-to-Date Systems appeared first on . Read More HERE…

Read More
TrendMicro

Best Practices for Endpoint Detection and Response

There are many elements that can complicate enterprise security efforts. From the increasing sophistication of cybercriminal strategies and activities to the wide range of components connected to the network, data protection and infrastructure security has become an uphill battle. Another key factor to consider here is the array of different endpoints connected to and communicating through…
The post Best Practices for Endpoint Detection and Response appeared first on . Read More HERE…

Read More
TrendMicro

Small businesses to receive NIST assistance: Overlooked areas of the NIST framework

In years past, it was a challenge for organizations across every industry to ensure they were protected against the risks of – and ready to respond to – a cybersecurity incident. Decision-makers and IT administrators alike followed the advice of experts and worked to create strong safeguards and response and recovery plans. It wasn’t until…
The post Small businesses to receive NIST assistance: Overlooked areas of the NIST framework appeared first on . Read More HERE…

Read More
TrendMicro

Safeguarding the Nation’s Critical Infrastructure

In May of 1998, President Clinton issued Presidential Decision Directive 63: Protecting America’s Critical Infrastructures. This Directive proposed steps to enact the recommendations of the President’s Commission on Critical Infrastructure Protection, published in October 1997. Twenty years on, how are things going? The US Federal government has identified critical infrastructure sectors and associated each with…
The post Safeguarding the Nation’s Critical Infrastructure appeared first on . Read More HERE…

Read More
TrendMicro

This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Apex One™ enters as the evolution of Trend Micro’s endpoint security solution for enterprise. Also, learn about Java Usage Tracker’s new weakness and the conditions that enabled…
The post This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws appeared first on . Read More HERE…

Read More
TrendMicro

It’s Everyone’s Job to Ensure Online Safety at Work

As part of our effort to support National Cyber Security Awareness Month I wanted to provide information on the need for everyone within a business to be aware of their role in keeping the organization safe from cyber attacks.  Let’s discuss some of the areas where we see existing organizations employees may be lacking in…
The post It’s Everyone’s Job to Ensure Online Safety at Work appeared first on . Read More HERE…

Read More
TrendMicro

Trend Micro Redefines Endpoint Security with Apex One™

Today, Trend Micro is excited to bring you Apex One™, the evolution of our endpoint security solution for enterprise. Apex One™ combines a breadth of threat detection & response capability with investigative features, in a single agent. Over the last few years, endpoint investigative features have become interesting in the marketplace, spurring the growth of…
The post Trend Micro Redefines Endpoint Security with Apex One™ appeared first on . Read More HERE…

Read More
TrendMicro

The BEC List: Helping Thwart Business Email Compromise through Collaboration

Today, the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) gave the JD Falk Award to the Business Email Compromise (BEC) List. The BEC List comprises cybersecurity firms, researchers and internet infrastructure companies that help deal with cybercriminal activities and schemes. The JD Falk Award is given to individuals or groups whose meritorious work has…
The post The BEC List: Helping Thwart Business Email Compromise through Collaboration appeared first on . Read More HERE…

Read More