Hit the Easy Button for Your Organization’s Gmail Security

Fifteen years ago, Gmail was launched by Google. The web-based service now has 1.5 billion users a month. In addition to being the extremely popular personal email service, Gmail is also a key component of G Suite for organizations. One of the many reasons of Gmail’s popularity is its security. Google makes use of multiple…
The post Hit the Easy Button for Your Organization’s Gmail Security appeared first on . Read More HERE…

Read more

Dallas Start-Ups: Pitch Us Your Ideas for a Smarter Connected World

At Trend Micro we’ve spent the past three decades successfully solving problems for our customers. It’s helped us to become a leading provider of services to secure the connected world. But we’re not done there. We also want to find and learn from the technology innovators and problem-solvers of tomorrow. That’s why our venture arm,…
The post Dallas Start-Ups: Pitch Us Your Ideas for a Smarter Connected World appeared first on . Read More HERE…

Read more

Third Party Testing of Security is a Very Big Deal for Customers

User Reviews + Test Results Peer reviews are an important part of product selection. Everything I buy on Amazon and most other things I buy I check for reviews first. That’s the “do I like it” or the test-drive part of the selection.  But the “how well does it work” part is lab testing. I’m…
The post Third Party Testing of Security is a Very Big Deal for Customers appeared first on . Read More HERE…

Read more

Protecting against the next wave of advanced threats targeting Office 365 – Trend Micro Cloud App Security 2018 detection results and customer examples

Since the release of “Trend Micro Cloud App Security 2017 Report” about a year ago, threats using email as the delivery vector have grown significantly. Business Email Compromise (BEC) scams have already caused USD $12.5 billion in global losses as of 2018 – a 136.4% increase from the $5.3 billion reported in 2017. The popularity…
The post Protecting against the next wave of advanced threats targeting Office 365 – Trend Micro Cloud App Security 2018 detection results and customer examples appeared first on . Read More HERE…

Read more

A Game of Risk with Broadcasters, Cyber Felons and Dragons

Submitted by Steve Ng, Lead, Digital Platform Operations, Mediacorp Where there’s money, there has always been crime. But what if money came in the form of intangible digital assets and crime in the form of cyber adversaries? In fantasy role-playing game Dungeons & Dragons, dragons are intelligent, mythical foes defined by their fiery prowess – boasting…
The post A Game of Risk with Broadcasters, Cyber Felons and Dragons appeared first on . Read More HERE…

Read more

Don’t Blame Employees who fall for a BEC scam!

The BBC reports that a media company based in Scotland is now suing a former employee who fell for a Business Email Compromise (BEC) scam. In the scam, the employee received emails which appeared to be from the managing director and requested wire transfers. The employee worked with her line manager on the first payment…
The post Don’t Blame Employees who fall for a BEC scam! appeared first on . Read More HERE…

Read more

Cyber Risk Index – A Guide for CISOs and IT Security

Trend Micro has partnered with the Ponemon Institute to develop a new Cyber Risk Index (CRI), which is intended to help CISOs and their IT Security teams better understand the current cyber risk compared to similar businesses of their size and industry. The CRI is based on a survey conducted by Ponemon to more than…
The post Cyber Risk Index – A Guide for CISOs and IT Security appeared first on . Read More HERE…

Read more

Collaborating with Law Enforcement to Tackle the Scourge of ATM Attacks

At Trend Micro, we’ve always been keen to collaborate with law enforcement. While we do our best to protect our customers from the latest threats, it’s only with concerted cross-border police action against the perpetrators of these crimes that we can hope to swing the pendulum back in our favor. One common target of attack…
The post Collaborating with Law Enforcement to Tackle the Scourge of ATM Attacks appeared first on . Read More HERE…

Read more

How Machine Learning can Expose and Illustrate Network Threats

Although machine learning algorithms have been around for years, additional use cases are being discovered and applied all the time, particularly when it comes to network and data security. As years have passed, the skills and sophisticated approaches being utilized by hackers have risen in severity and frequency, and white hats as well as enterprise…
The post How Machine Learning can Expose and Illustrate Network Threats appeared first on . Read More HERE…

Read more

Impacts to Enterprise Security: A Look at as-a-service Attacks

Ever since certain solutions have begun being offered “as-a-service,” the market for this method of delivery has exploded. Now, elements like software-as-a-service, infrastructure-as-a-service and platform-as-a-service are key mainstay components of enterprise IT, with the market values to prove it. According to MarketWatch, the global SaaS market is on track to expand by a more than…
The post Impacts to Enterprise Security: A Look at as-a-service Attacks appeared first on . Read More HERE…

Read more