Trend Micro Acquires Cloud Conformity

Developers who are responsible for managing their business’s IT infrastructure day-to-day often have to work with the technology providers they’re given. Our goal is to make sure our security solutions work for developers, providing seamless, automated security, rather than a roadblock to work around so you can do your job. Today’s acquisition of Cloud Conformity…
The post Trend Micro Acquires Cloud Conformity appeared first on . Read More HERE…

Read more

Tackling the BEC Epidemic in a New Partnership with INTERPOL

In just a few short years, Business Email Compromise (BEC) has gone from a peripheral threat to a major cyber risk for organizations. It’s making criminal gangs millions of dollars each month, hitting corporate profits and reputation in the process. Trend Micro has built a formidable array of resources over the past few years to…
The post Tackling the BEC Epidemic in a New Partnership with INTERPOL appeared first on . Read More HERE…

Read more

The Sky Has Already Fallen (you just haven’t seen the alert yet)

Of course, the much-touted “Cybersecurity Skills Shortage” isn’t news to anyone, or it shouldn’t be. For seven or more years, journalists, industry analysts and practitioners have been opining about it one way or another. Analyses and opinions vary on how we have reached this impasse, my own being that this is a largely self-inflicted crisis…
The post The Sky Has Already Fallen (you just haven’t seen the alert yet) appeared first on . Read More HERE…

Read more

Three Network Security Questions with CEITEC’s CIO

Ireneo Demanarig is the Chief Information Officer at CEITEC S.A. located in Porto Alegre, Rio Grande do Sul, Brazil. CEITEC is a microelectronics manufacturer that specializes in solutions such as automatic identification (RFID and smartcards), application-specific integrated circuits (ASICs) aimed at identifying animals, and much more. Recently, I jumped on the phone with Ireneo and…
The post Three Network Security Questions with CEITEC’s CIO appeared first on . Read More HERE…

Read more

Why You Should Pick a Leader for Your Enterprise Email Security

Email is a mature technology, but threats targeting email are evolving and getting more sophisticated. 97%1 of ransomware attacks come from email. That’s why there are so many email security vendors and solutions in the market offering different types of technologies and coverages. Picking the best email security solution for an organization can be overwhelming….
The post Why You Should Pick a Leader for Your Enterprise Email Security appeared first on . Read More HERE…

Read more

Hit the Easy Button for Your Organization’s Gmail Security

Fifteen years ago, Gmail was launched by Google. The web-based service now has 1.5 billion users a month. In addition to being the extremely popular personal email service, Gmail is also a key component of G Suite for organizations. One of the many reasons of Gmail’s popularity is its security. Google makes use of multiple…
The post Hit the Easy Button for Your Organization’s Gmail Security appeared first on . Read More HERE…

Read more

Dallas Start-Ups: Pitch Us Your Ideas for a Smarter Connected World

At Trend Micro we’ve spent the past three decades successfully solving problems for our customers. It’s helped us to become a leading provider of services to secure the connected world. But we’re not done there. We also want to find and learn from the technology innovators and problem-solvers of tomorrow. That’s why our venture arm,…
The post Dallas Start-Ups: Pitch Us Your Ideas for a Smarter Connected World appeared first on . Read More HERE…

Read more

Third Party Testing of Security is a Very Big Deal for Customers

User Reviews + Test Results Peer reviews are an important part of product selection. Everything I buy on Amazon and most other things I buy I check for reviews first. That’s the “do I like it” or the test-drive part of the selection.  But the “how well does it work” part is lab testing. I’m…
The post Third Party Testing of Security is a Very Big Deal for Customers appeared first on . Read More HERE…

Read more

Protecting against the next wave of advanced threats targeting Office 365 – Trend Micro Cloud App Security 2018 detection results and customer examples

Since the release of “Trend Micro Cloud App Security 2017 Report” about a year ago, threats using email as the delivery vector have grown significantly. Business Email Compromise (BEC) scams have already caused USD $12.5 billion in global losses as of 2018 – a 136.4% increase from the $5.3 billion reported in 2017. The popularity…
The post Protecting against the next wave of advanced threats targeting Office 365 – Trend Micro Cloud App Security 2018 detection results and customer examples appeared first on . Read More HERE…

Read more

A Game of Risk with Broadcasters, Cyber Felons and Dragons

Submitted by Steve Ng, Lead, Digital Platform Operations, Mediacorp Where there’s money, there has always been crime. But what if money came in the form of intangible digital assets and crime in the form of cyber adversaries? In fantasy role-playing game Dungeons & Dragons, dragons are intelligent, mythical foes defined by their fiery prowess – boasting…
The post A Game of Risk with Broadcasters, Cyber Felons and Dragons appeared first on . Read More HERE…

Read more