Keep Your Smart Home Safe: Here’s What You Can Do Today to Secure Your Products

Credit to Author: Trend Micro| Date: Wed, 22 May 2019 12:59:05 +0000

The Internet of Things (IoT) is transforming the way we live, work and play. You can find it in the fitness trackers you might be wearing to monitor step count and heart rate. Or the car you may be driving. But more than anywhere else, you’ll see IoT at home in an increasing array of…

The post Keep Your Smart Home Safe: Here’s What You Can Do Today to Secure Your Products appeared first on .

Read more

Celebrating the Next Generation of Technology Innovators

Credit to Author: Trend Micro| Date: Tue, 21 May 2019 14:36:59 +0000

At Trend Micro, it’s our mission to secure the connected world. However, we want to go beyond the boundaries of the cybersecurity industry to support and learn from the technology innovators of tomorrow. That’s what our venture arm, Trend Forward Capital, is all about. As part of these efforts, we held a pitch-off competition this…

The post Celebrating the Next Generation of Technology Innovators appeared first on .

Read more

This Week in Security News: Unsecured Servers and Vulnerable Processors

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 17 May 2019 14:14:56 +0000

  Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about vulnerabilities that can allow hackers to retrieve data from CPUs and mine cryptocurrency. Read on: May’s Patch Tuesday Include Fixes for ‘Wormable’ Flaw in…

The post This Week in Security News: Unsecured Servers and Vulnerable Processors appeared first on .

Read more

Why You Should Pick a Leader for Your Enterprise Email Security

Credit to Author: Joyce Huang| Date: Thu, 16 May 2019 14:30:38 +0000

Email is a mature technology, but threats targeting email are evolving and getting more sophisticated. 97%1 of ransomware attacks come from email. That’s why there are so many email security vendors and solutions in the market offering different types of technologies and coverages. Picking the best email security solution for an organization can be overwhelming….

The post Why You Should Pick a Leader for Your Enterprise Email Security appeared first on .

Read more

This Week in Security News: Skimming Attacks and Ransomware

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 10 May 2019 13:00:42 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how credit card skimming attacks can impact businesses and how ransomware can use software installations to help hide malicious activities. Read on: Mirrorthief Group Uses Magecart…

The post This Week in Security News: Skimming Attacks and Ransomware appeared first on .

Read more

Cybersecurity Leaders Are Talking A Lot About Counterfeit Devices

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Tue, 07 May 2019 13:00:28 +0000

Malice Vs Greed Most discussion about security in the supply chain has been focused on detecting tampering, or preventing backdoors or sneaky things being inserted into components and software. There’s another aspect emerging and will dwarf the tampering: devices that are counterfeited for profit indirectly causing security problems. Counterfeit devices are ones that either by…

The post Cybersecurity Leaders Are Talking A Lot About Counterfeit Devices appeared first on .

Read more

Are Your Passwords Secure Enough?

Credit to Author: Trend Micro| Date: Fri, 03 May 2019 16:20:58 +0000

Today, we'll take a deep dive into passwords, including what vulnerabilities weak passwords can open up and how to improve authentication security.

Online passwords are sensitive data. When they end up in the wrong hands, your private information is at risk. Since cybercriminals are always searching out new ways to break into those online accounts, you need to watch over the passwords to your accounts as if they were your children. Since we typically access our accounts…

The post Are Your Passwords Secure Enough? appeared first on .

Read more

This Week in Security News: BEC Attacks and Botnet Malware

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 03 May 2019 14:00:25 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the prevalence and impact of BEC attacks. Also, find out how botnet malware can perform remote code execution, DDoS attacks and cryptocurrency mining. Read on:…

The post This Week in Security News: BEC Attacks and Botnet Malware appeared first on .

Read more

The Next Enterprise Challenge: How Best to Secure Containers and Monolithic Apps Together, Company-wide

Credit to Author: Trend Micro| Date: Tue, 30 Apr 2019 13:00:51 +0000

Submitted by: Adam Boyle, Head of Product Management, Hybrid Cloud Security, Trend Micro When it comes to software container security, it’s important for enterprises to look at the big picture, taking into account how they see containers effecting their larger security requirements and future DevOps needs. Good practices can help security teams build a strategy that…

The post The Next Enterprise Challenge: How Best to Secure Containers and Monolithic Apps Together, Company-wide appeared first on .

Read more

This Week in Security News: Phishing Attacks and Ransomware

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 26 Apr 2019 12:00:16 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about schemes used in phishing and other email-based attacks. Also, learn how ransomware continues to make a significant impact in the threat landscape. Read on: New…

The post This Week in Security News: Phishing Attacks and Ransomware appeared first on .

Read more

Dallas Start-Ups (submission extended): Pitch Us Your Ideas for a Smarter Connected World

Credit to Author: Trend Micro| Date: Mon, 08 Apr 2019 13:00:40 +0000

updated April 22, 2019 At Trend Micro we’ve spent the past three decades successfully solving problems for our customers. It’s helped us to become a leading provider of services to secure the connected world. But we’re not done there. We also want to find and learn from the technology innovators and problem-solvers of tomorrow. That’s…

The post Dallas Start-Ups (submission extended): Pitch Us Your Ideas for a Smarter Connected World appeared first on .

Read more