{"id":6551,"date":"2017-02-08T07:00:06","date_gmt":"2017-02-08T15:00:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/08\/news-375\/"},"modified":"2017-02-08T07:00:06","modified_gmt":"2017-02-08T15:00:06","slug":"news-375","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/02\/08\/news-375\/","title":{"rendered":"Go Beyond Next Gen with XGen\u2122 at RSA 2017"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_83175109_XXXLARGE-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_83175109_XXXLARGE-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_83175109_XXXLARGE-768x513.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_83175109_XXXLARGE-1024x683.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_83175109_XXXLARGE-640x427.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_83175109_XXXLARGE-900x601.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_83175109_XXXLARGE-440x294.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_83175109_XXXLARGE-380x254.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>As the security world begins arriving in San Francisco for next week\u2019s <a href=\"https:\/\/www.rsaconference.com\/\">RSA Conference<\/a>, there will be plenty to capture their attention. From the keynotes to a few ad hoc business meetings, RSA attendees can expect an exciting lineup of workshops and sessions aimed at answering the latest cybersecurity questions and dilemmas.<\/p>\n<p>And this this year, our Trend Micro experts will be at Booth No. 1107 to demonstrate the company\u2019s smart, optimized and connected security solutions, which are powered by <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/all-solutions.html\">XGen\u2122 technology<\/a>, and work in tandem to seamlessly defend enterprises now and in the future.<\/p>\n<p>Trend Micro experts will also be presenting four sessions throughout the event. Session and speaker details:<\/p>\n<p><a href=\"https:\/\/www.rsaconference.com\/events\/us17\/agenda\/sessions\/7072-ransomware\">Not UNIX to Windows Anymore: A First in a Booming Ransomware Industry<\/a><\/p>\n<p>Benjamin Rivera, Trend Micro threat research and training; and Joachim Suico, Trend Micro threat research engineer<\/p>\n<p>Monday, February 13, 3:15-3:45 p.m.<\/p>\n<p>Moscone Center West; 2014<\/p>\n<p>This session is part of a full day seminar about ransomware and its multifaceted implications across technical, policy, compliance and financial response. Sessions throughout the day will discuss innovative research, present case studies on response and recovery to ransomware, explore combatting ransomware and debate if\u2014and when\u2014you should pay the ransom.<\/p>\n<p><a href=\"https:\/\/www.rsaconference.com\/events\/us17\/agenda\/sessions\/4625-profiling-exposed-cyber-infrastructure-in-cities-in\">Profiling Exposed Cyber Infrastructure in Cities in the United States<\/a><\/p>\n<p>Numaan Huq and Stephen Hilt, Trend Micro Forward Looking Threat researchers<\/p>\n<p>Wednesday, February 15, 1:30 \u2013 2:00 p.m.<\/p>\n<p>Marriott Marquis; The Sandbox &#8211; ICS Stage<\/p>\n<p>The Internet of Things is connecting everything from computers, mobile devices, cars, industrial robots, home appliances and even clothing to the Internet. This session will reveal research findings on exactly why exposed cyber-infrastructure poses a serious threat to both national security and the everyday functioning of cities.<\/p>\n<p><a href=\"https:\/\/www.rsaconference.com\/events\/us17\/agenda\/sessions\/7448-maximum-security-with-minimum-impact-going-beyond\">Maximum Security with Minimum Impact &#8211; Going Beyond Next Gen?<\/a><\/p>\n<p>Wendy Moore, Trend Micro director of user protection<\/p>\n<p>Wednesday, February 15, 1:30-2:15 p.m.<\/p>\n<p>Moscone Center North; 132<\/p>\n<p>New ways to protect against malware appear daily. The new techniques sound like a panacea for stopping all malware, but each technique has advantages and disadvantages. Learn about the tradeoffs of machine learning, application control; exploit prevention, and behavioral analysis and forensics, as well as how cross-generational blending of techniques can protect you against ever-evolving threats.<\/p>\n<p><a href=\"https:\/\/www.rsaconference.com\/events\/us17\/agenda\/sessions\/5230-securing-serverless-applications-in-the-cloud\">Securing Serverless Applications In The Cloud<\/a><\/p>\n<p>Mark Nunnikhoven, Trend Micro vice president of cloud research<\/p>\n<p>Thursday, February 16, 8:00 \u2013 8:45 a.m.<\/p>\n<p>Moscone Center South; 301<\/p>\n<p>Serverless applications offer a number of advantages, the biggest one being freedom from a number of standard operational tasks. And while you may not need to do basic ops tasks, you still have a responsibility to keep your data safe and secure. Serverless designs require a completely new approach to development, and securing these applications requires new concepts, processes and tools.<\/p>\n<p>While at the Trend Micro booth, visitors will gain in-depth knowledge about the expansion of Trend Micro\u2019s powerful XGen\u2122 technology to all of its solutions. <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/all-solutions.html\">XGen\u2122 security<\/a> will effectively and holistically protect an enterprise\u2019s networks, hybrid cloud environments and endpoints from ever-evolving security risks. This technology uses a blend of cross-generational threat defense techniques fueled by market leading security intelligence that is seamlessly shared across all layers of defense.<\/p>\n<p style=\"text-align: left\">For more information, visit <a href=\"http:\/\/www.trendmicro.com\/us\/security-intelligence\/events\/rsa-conference\/index.html\">http:\/\/www.trendmicro.com\/us\/security-intelligence\/events\/rsa-conference\/index.html<\/a>, and follow <a href=\"https:\/\/twitter.com\/TrendMicro\">@TrendMicro<\/a> on Twitter.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/go-beyond-next-gen-xgen-rsa-2017\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_83175109_XXXLARGE-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_83175109_XXXLARGE-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_83175109_XXXLARGE-768x513.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_83175109_XXXLARGE-1024x683.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_83175109_XXXLARGE-640x427.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_83175109_XXXLARGE-900x601.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_83175109_XXXLARGE-440x294.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_83175109_XXXLARGE-380x254.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>As the security world begins arriving in San Francisco for next week\u2019s RSA Conference, there will be plenty to capture their attention. From the keynotes to a few ad hoc business meetings, RSA attendees can expect an exciting lineup of workshops and sessions aimed at answering the latest cybersecurity questions and dilemmas. And this this&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[714,10418],"class_list":["post-6551","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-security","tag-trend-spotlight"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6551"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6551\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6551"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}