TrendMicro

SecurityTrendMicro

Securing the Three Families of IoT

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Thu, 11 Jan 2018 14:01:44 +0000

Securing the Internet of Things is difficult. One reason is the Internet of things consists of three different groups of technology. Each group has radically different architectural constraints. Securing each group requires a distinct approach. IoT 0.9  The primitive group contains all legacy Operational Technology (OT) and Industrial Control Systems (ICS) that use some form…

Read More
SecurityTrendMicro

Trend Micro Champions the AWS Marketplace Channel Opportunity Registration Program

Credit to Author: Trend Micro| Date: Tue, 09 Jan 2018 15:17:44 +0000

Last year, Trend Micro launched our popular Deep Security as a Service offering on the AWS Marketplace, combining industry-leading threat protection for cloud workloads, effortless deployment, and the added bonus of a unified Amazon Web Services (AWS) bill. This has been a successful model for customers wanting to purchase workload protection directly, however the reality…

Read More
SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of January 1, 2018

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 05 Jan 2018 16:45:25 +0000

Happy New Year! It’s out with the old, in with the new, right? Except we all know that the old tends to stick around, especially when it comes to vulnerabilities and patching them. Trend Micro predicts that that 2018’s biggest attacks will originate from known vulnerabilities. And speaking of known vulnerabilities, the Zero Day Initiative…

Read More
SecurityTrendMicro

Fixing the Meltdown and Spectre vulnerabilities

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Thu, 04 Jan 2018 13:22:58 +0000

Two days ago, Graz University of Technology published a paper https://spectreattack.com/ describing a pair of attacks on common microprocessors. The underlying vulnerability affects Intel, AMD, and ARM processors. All contemporary microprocessors pre-execute instructions. In other words, the vulnerability bypasses address space isolation. Address space isolation has been a foundation for processor integrity since the 1980s….

Read More
SecurityTrendMicro

Trend Micro: Winning at Wellness Again

Credit to Author: Bob Kedrosky| Date: Thu, 28 Dec 2017 13:30:59 +0000

In the never-ending race for profits, shareholder value and customer wins, organizations can sometimes forget about their employees. Yet in reality, your workers are your number one asset: if they feel undervalued or disrespected it can rip the heart and soul out of the organization, setting off a chain reaction from which it can be…

Read More
SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of December 25, 2017

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 29 Dec 2017 16:13:02 +0000

Last Sunday, my day could be best described by the lyrics of Sammy Hagar’s song “I Can’t Drive 55.” I was issued a ticket for an alleged speeding infraction. I usually drive about 10 mph over the speed limit, but my “alleged” lead foot got the best of me and so did the Texas Highway…

Read More