Third Party Testing of Security is a Very Big Deal for Customers

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Wed, 20 Mar 2019 13:00:27 +0000

User Reviews + Test Results Peer reviews are an important part of product selection. Everything I buy on Amazon and most other things I buy I check for reviews first. That’s the “do I like it” or the test-drive part of the selection.  But the “how well does it work” part is lab testing. I’m…

The post Third Party Testing of Security is a Very Big Deal for Customers appeared first on .

Read more

How Radio Frequency Technology is Putting the Industrial Sector at Risk

Credit to Author: Trend Micro| Date: Tue, 19 Mar 2019 14:00:45 +0000

Each industry has its own unique security risks. The banking and health care sectors, for example, deal with some considerably sensitive financial and client data, and therefore must put robust protections in place to ensure its safety. The industrial sector, however, is a bit different. For many years, security-conscious experts focused on other industries, but now…

The post How Radio Frequency Technology is Putting the Industrial Sector at Risk appeared first on .

Read more

This Week in Security News: Security Vulnerabilities

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 15 Mar 2019 12:13:34 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn what critical approaches can protect your enterprise business from software vulnerabilities. Also, learn about vulnerabilities in IoT alarms that let hackers hijack cars. Read on: How…

The post This Week in Security News: Security Vulnerabilities appeared first on .

Read more

How to get Ahead of Vulnerabilities and Protect your Enterprise Business

Credit to Author: Trend Micro| Date: Tue, 12 Mar 2019 14:00:37 +0000

Security vulnerabilities are popping up all the time, and can put any business that uses technological assets at risk. In a nutshell, vulnerabilities represent the ideal opportunity for malicious actors to break into systems and wreak all types of havoc. From data theft to information compromise and beyond, vulnerabilities are a particularly pertinent issue for…

The post How to get Ahead of Vulnerabilities and Protect your Enterprise Business appeared first on .

Read more

A $100,000 Commitment to Close the Gender Diversity Gap in Cybersecurity

Credit to Author: Trend Micro| Date: Fri, 08 Mar 2019 15:00:41 +0000

Today as we celebrate International Women’s Day and as we move into March, it’s business-as-usual on the cybercrime underground. The same old roll-call of embarrassing data breaches, preventable privacy leaks, ransomware-related outages and more continue to dominate the news headlines. And while technology plays a key part in helping to mitigate these risks, people are…

The post A $100,000 Commitment to Close the Gender Diversity Gap in Cybersecurity appeared first on .

Read more

This Week in Security News: IoT Threats and Risks

Credit to Author: Cara West-Wainwright| Date: Fri, 08 Mar 2019 15:00:00 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the threats and risks to complex IoT environments. Also, learn about new security challenges and risks the food production industry faces. Read on: Securing Smart…

The post This Week in Security News: IoT Threats and Risks appeared first on .

Read more

A Mobile App Scanner is Not Just Another App

Credit to Author: Trend Micro| Date: Thu, 07 Mar 2019 15:00:28 +0000

Mobile applications assist us mightily with our daily tasks. They increase our productivity with anywhere, anytime, high-functioning tools, and they help us communicate and share information with family members, friends, and co-workers. Every day, the rapidly evolving app market brings us more apps to cater to our needs. Sound good? Well, it is! But sometimes,…

The post A Mobile App Scanner is Not Just Another App appeared first on .

Read more

Beauty Out of Chaos: Elevating Cybersecurity to an Art Form – Part 2

Credit to Author: Leah MacMillan| Date: Thu, 07 Mar 2019 15:00:23 +0000

Art and cybersecurity are not two worlds usually seen sharing the same orbit. But at Trend Micro we believe there’s a vision, a mastery of skill and a passion which unites both. It’s an approach we’ve spent the past three decades honing as serious barriers have emerged to challenge IT efforts to support the business….

The post Beauty Out of Chaos: Elevating Cybersecurity to an Art Form – Part 2 appeared first on .

Read more

Beauty Out of Chaos: Elevating Cybersecurity to an Art Form – Part 1

Credit to Author: Leah MacMillan| Date: Tue, 05 Mar 2019 15:00:16 +0000

How many of you can remember what it was like managing IT security 10 years ago? How about two decades? The truth is that the landscape was so utterly different back then that any comparisons with today are a little unfair. Yet they’re useful in one key regard: to teach us just how complex and…

The post Beauty Out of Chaos: Elevating Cybersecurity to an Art Form – Part 1 appeared first on .

Read more

A Look Back at the 2018 Security Landscape

Credit to Author: Jon Clay (Global Threat Communications)| Date: Mon, 04 Mar 2019 15:00:20 +0000

Do you ever question the value of the mounds of data we all collect? We make a point to stop, analyze and share, especially because we know you might not have the time. So, I bring you our annual look back at the more interesting security events and trends seen last year. The report, Caught…

The post A Look Back at the 2018 Security Landscape appeared first on .

Read more

This Week in Security News: Instagram Hackers and Enterprise Threats

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 01 Mar 2019 14:57:50 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how a group of hackers is stealing popular Instagram profiles. Also, learn about old and new cybersecurity issues inundated enterprises in 2018. Read on: Insecure VPNs:…

The post This Week in Security News: Instagram Hackers and Enterprise Threats appeared first on .

Read more