TrendMicro

SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of October 9, 2017

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 13 Oct 2017 14:03:59 +0000

Even though “Patch Tuesday” isn’t supposed to exist anymore, here I am blogging about it. As I looked at the October updates from Microsoft, the usual suspects were there. But this month was a little different. We usually see critical vulnerabilities on the browser side, but Microsoft Office is in the spotlight with CVE-2017-11826 under…

Read More
SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of October 2, 2017

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 06 Oct 2017 14:55:49 +0000

Have you ever read something online and you read a word as something else? Sometimes the weight of our eyelids makes our eyes deceive us after hours staring at a computer screen. As I stated to read a Zero Day Initiative blog published this week by Simon Zuckerbraun, instead of reading the word “Chakra,” which…

Read More
SecurityTrendMicro

Cybersecurity in the Workplace is Everybody’s Business

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Tue, 10 Oct 2017 13:00:04 +0000

What can individual users do to preserve cybersecurity at work? Your organization is spending on cybersecurity tools, you have an awareness program, and if you look you will find that there are standards and procedures for choosing and maintaining products to help keep information secure. But what can an individual do? Remember – you are…

Read More
SecurityTrendMicro

Bargains and brotherhood: The underground Digital Souks of the Middle East

Credit to Author: Rik Ferguson (VP, Security Research)| Date: Tue, 10 Oct 2017 12:00:29 +0000

The release of our report “Digital Souks: A glimpse into the Middle Eastern and North African underground” marks the 12th in our Cybercriminal Underground Economy Series (CUES). Having previously published several papers covering the Japanese, French, German, North American, Chinese, Russian and Brazilian undergrounds this is the first report of its kind focusing on this…

Read More
SecurityTrendMicro

When Phishing Starts from the Inside

Credit to Author: Chris Taylor| Date: Thu, 05 Oct 2017 13:00:54 +0000

Phishing is one of the greatest and most time consuming challenge security professionals face today.A growing concern of security professionals is internal phishing attacks – phishing emails sent from one trusted user to another of the same organization. Internal phishing emails are used in multi-stage attacks in which an email account is owned either by controlling the users device with previously installed malware or by compromising the account credentials…

Read More
SecurityTrendMicro

Taking Healthcare Threat Protection to the Next Level with HITRUST

Credit to Author: Mike Gibson| Date: Tue, 03 Oct 2017 12:00:22 +0000

Healthcare organizations (HCOs) worldwide continue to be on the receiving end of cyber-attacks. But if we work together we have both the tools and motivation to turn this around. That’s why Trend Micro has been a long-time partner and advocate of the great work HITRUST is doing to help improve baseline cyber security resilience and…

Read More
SecurityTrendMicro

National Cyber Security Awareness Month for Organizations

Credit to Author: Jon Clay| Date: Mon, 02 Oct 2017 12:00:25 +0000

The month of October 2017 is again the National Cyber Security Awareness Month (NCSAM) for individuals and organizations. This year’s theme is shared responsibility which is something we’ve been talking a lot about when it comes to public cloud support for many years. This year Trend Micro will be supporting NCSAM with a new blog…

Read More
SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of September 25, 2017

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 29 Sep 2017 18:24:40 +0000

A couple of years back, I remember working at a tradeshow booth and giving a demo to someone who was interested in our solution. He said, “Your solution is great, but I need something that will not let anyone from the outside in my network and I need something that will not let my employees…

Read More