Credit to Author: Jon Clay (Global Threat Communications)| Date: Wed, 17 Oct 2018 13:05:17 +0000
As part of our effort to support National Cyber Security Awareness Month I wanted to provide information on the need for everyone within a business to be aware of their role in keeping the organization safe from cyber attacks. Let’s discuss some of the areas where we see existing organizations employees may be lacking in…
Credit to Author: Eric Skinner| Date: Mon, 15 Oct 2018 16:28:05 +0000
Today, Trend Micro is excited to bring you Apex One™, the evolution of our endpoint security solution for enterprise. Apex One™ combines a breadth of threat detection & response capability with investigative features, in a single agent. Over the last few years, endpoint investigative features have become interesting in the marketplace, spurring the growth of…
Credit to Author: Jovi Umawing| Date: Fri, 12 Oct 2018 16:00:00 +0000
Among insider threats, workplace violence could be considered the most dangerous. And yet, the majority of organizations are not prepared. What should they do to protect their employees?
Credit to Author: Trend Micro| Date: Thu, 11 Oct 2018 19:30:01 +0000
Today, the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) gave the JD Falk Award to the Business Email Compromise (BEC) List. The BEC List comprises cybersecurity firms, researchers and internet infrastructure companies that help deal with cybercriminal activities and schemes. The JD Falk Award is given to individuals or groups whose meritorious work has…
Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Thu, 11 Oct 2018 14:02:18 +0000
Ask a room full of cybersecurity professionals about their educational background and how they got started on their career path and you’re going to get a myriad of different answers. From one perspective, that’s frustrating. It’s hard to confidently recommend a path for people starting out when almost any path can end up at your…