TrendMicro

SecurityTrendMicro

A View of Upcoming Threat Coverage from Pwn2Own 2018

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Wed, 14 Mar 2018 21:18:38 +0000

This blog will be updated throughout the competition so keep tracking for the latest updates on upcoming threat coverage! St. Patrick’s Day is coming up later this week, but the contestants at Pwn2Own 2018 will need more than luck on their side. They will need to dive into their expert hacking skills in the hopes…

The post A View of Upcoming Threat Coverage from Pwn2Own 2018 appeared first on .

Read More
SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 5, 2018

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 09 Mar 2018 15:40:21 +0000

Today marks the first day of South by Southwest (SXSW) here in Austin and if you happen to be in town for the event, Trend Micro will be there! Starting tomorrow, Trend Micro will be exhibiting at the SXSW Job Market in booth 523. The SXSW Job Market is being held on March 10-11, 2018…

The post TippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 5, 2018 appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Rules and Roles

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 09 Mar 2018 15:32:12 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, The New York Times critiqued the S.E.C.’s new cybersecurity guidance, Github suffered a record-breaking DDoS attack, and Forbes outlined the roles and responsibilities of CFOs and CMOs…

The post This Week in Security News: Rules and Roles appeared first on .

Read More
SecurityTrendMicro

Two-Factor Authentication: What is it and why do I need it to stay safe online?

Credit to Author: Brook Stein, Product Management Director| Date: Fri, 09 Mar 2018 14:27:02 +0000

Mac users have to be wary of malware.

Today, Americans are living more and more of their lives on the internet. We shop, bank, socialize, work and play online. But as our digital lives become increasingly important, they are also exposed to greater risks. Hackers are lurking around every corner ready to steal our identities, drain our bank accounts, and lock us out…

The post Two-Factor Authentication: What is it and why do I need it to stay safe online? appeared first on .

Read More
SecurityTrendMicro

2017’s Biggest Threats and What CISOs Can do to Mitigate Risks in 2018

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Thu, 08 Mar 2018 14:00:51 +0000

Enterprise Risk Management (ERM) is getting harder every day. According to the World Economic Forum‘s 2018 Global Risks Perception Survey, cyber attacks and data theft are 3 and 4 respectively of the top 5 likely risks organizations will face this year. This is not surprising, in 2017 CISOs the world over faced crippling ransomware attacks,…

Read More
SecurityTrendMicro

Trend Micro at HiMSS: Protecting Healthcare Organizations with Optimized, Connected Security

Credit to Author: Trend Micro| Date: Wed, 07 Mar 2018 15:00:16 +0000

Submitted by Elie Nasrallah
, Director – Cyber Security Strategy
 The healthcare industry remains one of the most frequently targeted sectors in the United States. It accounted for nearly a quarter (23%) of all breaches reported in 2017, second only to the business category, in another record year for data theft. That’s why Trend Micro has been a…

Read More
SecurityTrendMicro

How to Clean Install macOS High Sierra – Includes installing macOS from a USB device

Credit to Author: Trend Micro| Date: Tue, 06 Mar 2018 14:00:57 +0000

Along with the upgrade of Mac OS X, its name has also changed to High Sierra. Due to Apple’s restrictions, some older Macs cannot be upgraded to the latest macOS High Sierra. You may want to install a completely new macOS. This article explains how to clean install the macOS High Sierra. First we need…

Read More