Helping Mobile Operators Keep Customers Safe with Virtualized Network Security
Credit to Author: Trend Micro| Date: Wed, 27 Sep 2017 13:00:26 +0000
At Trend Micro we’re always looking for innovative new ways to support our customers and help overcome their cybersecurity challenges. Mobile network operators (MNOs) are increasingly adopting virtualization and software acceleration technologies to become more agile in how they deploy and operate network services: for example, to help deal with large, unpredictable network volumes during…
Trend Micro and Europol’s European Cybercrime Centre (EC3) today released a publicly available report on the ATM malware landscape. This builds on the 2016 report that was privately released to financial institutions and law enforcement agencies globally. The report digs into the depth and breadth of malware targeting ATMs, as well as the perpetrators behind…
Endpoints are no longer the best place to block threats, and this will be important to keep in mind as malicious techniques continue to advance.
Today we are excited to introduce new email security technologies powered by XGen® and a new product, Smart Protection for Office 365. This new service combines the advantages of both an email gateway with an API service integrated solution to provide complete threat protection for Microsoft Office 365. It helps address the complete threat lifecycle…
The Morton Salt slogan “When it rains it pours” refers to its free flowing salt with a pouring spot and is a variation of the proverb “It never rains but it pours.” Unfortunately, Mother Nature has taken the proverb literally. This has been a devastating hurricane season for the United States and surrounding countries in…
On 8 September, credit reporting agency Equifax confessed to a major data breach. It affects 143 million Americans – nearly half of the US population – and 100,000 Canadian consumers. Unfortunately, this means that the hackers may have access to highly sensitive personal and financial information, allowing them to carry out follow-on attacks and identity…
As we all return to work from the summer holidays, we at Trend Micro reflect on what we have seen in the threat landscape over the first six months of 2017 with the release of our 2017 Mid-Year Security Roundup. It takes me back to the two major attacks that we witnessed, and I was…
In today’s ransomware update, we’ll take a look at some of the newest attack styles being used today, as well as the best ways your organization can guard against ransomware.