Business

SecurityTrendMicro

A Storm’s a Coming: How businesses can defend against threat actor groups like Pawn Storm

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Tue, 25 Apr 2017 14:00:47 +0000

It's critical to hire a CISO that has experience and can lead a team.Pawn Storm (aka Sednit5, Fancy Bear, APT28, Sofacy and STRONTIUM8) might sound like Instagram accounts, top-secret spy programs or recently passed legislation, but in reality they are all different names for the same successful cyber espionage group (or threat actor group). These actors often use multi-angle bombardment attacks on the same target, implementing multiple methods…

Read More
SecurityTrendMicro

Five Questions with University of Florida Health

Credit to Author: Justin Foster| Date: Wed, 15 Mar 2017 13:00:48 +0000

With the growing number of threats, technologies, and responsibilities, security teams have no shortage of challenges they face daily. Now more than ever, it is important that security providers offer tools that work with these teams instead of against them; solutions that allow for opportunities in place of constraints. This is why customers were directly…

Read More
SecurityTrendMicro

Celebrating the One Year Anniversary of Acquiring TippingPoint

Credit to Author: Steve Quane| Date: Wed, 15 Mar 2017 12:00:35 +0000

The month of March marks the one year anniversary of Trend Micro closing our acquisition of TippingPoint from Hewlett Packard Enterprise (HPE). In that past year, we made a commitment to continue to innovate the TippingPoint solution while at the same time solidly executing for our customers and seamlessly continuing business operations. I’m pleased to…

Read More
SecurityTrendMicro

Challenges and Opportunities for 2017: Trend Micro Global Research Peels Back the Layers

Credit to Author: Raimund Genes (Chief Technology Officer)| Date: Tue, 14 Mar 2017 12:00:08 +0000

The year 2017 could be a pivotal moment for cybersecurity in Europe. And that’s thanks to two things: alleged state-sponsored interference in forthcoming national elections in the region, and looming European data protection laws. Both have escalated the issue of online threats and data security right up to board level, in Europe and the U.S….

Read More
SecurityTrendMicro

How to Secure Your Enterprise

Credit to Author: Raimund Genes (Chief Technology Officer)| Date: Wed, 08 Mar 2017 14:00:20 +0000

This year, keep your company protected from cyber criminals.Over the past decade, the threat landscape has evolved extensively from the beginnings of worms in 2001 to botnets and spyware in 2005. Now, targeted attacks, mobile threats and destructive crypto-ransomware are a daily reality. The damage caused by these threats has escalated, as well, to potentially crippling levels for an impacted organization. To mitigate…

Read More
SecurityTrendMicro

Deep Security 10: Customer Driven Development with TRC

Credit to Author: Justin Foster| Date: Wed, 08 Mar 2017 13:00:53 +0000

At least that used to be the standard software development process. Customers were involved in feedback quite late in the development process, often after the release has been mostly formed. We recently shared how Deep Security 10 is an example of server security standing the test of time but it was also the first release…

Read More