TrendMicro

SecurityTrendMicro

Join us at Black Hat 2017

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Mon, 24 Jul 2017 12:00:34 +0000

Hackers can make a number of easily identifiable mistakes.Hide your phones, hide your laptops ‘cause they’re hackin’ everyone out here! For the 20th year, on July 26 and 27, thousands of cybersecurity executives, researchers and enthusiasts will descend upon Las Vegas for Black Hat 2017, including some of Trend Micro’s finest. Throughout the week, Trend Micro experts and researchers can be found sharing…

Read More
SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of July 17, 2017

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 21 Jul 2017 18:07:14 +0000

If you conduct a search on the Web for the number of languages spoken around the world, you’ll see numbers ranging anywhere from 6,000-7,000. I figure I’m doing okay since I can speak English and Spanish, sign the English alphabet, recite the Greek alphabet, and read music. There are roughly over 1.2 billion web sites…

Read More
SecurityTrendMicro

Did you see what the Black Hat newsletter said about Trend Micro?

Credit to Author: Justin Foster| Date: Wed, 19 Jul 2017 12:00:45 +0000

This year’s Black Hat® conference is right around the corner. Now, amazingly, in its 20th year, Black Hat is one of the world’s top gathering of information security professionals. Friends in the industry refer to this as “Security Summer Camp” and it’s true, between the training, briefings, arsenal, and business hall, Black Hat is chocked…

Read More
SecurityTrendMicro

Getting ready for Black Hat!

Credit to Author: Justin Foster| Date: Wed, 19 Jul 2017 12:00:45 +0000

This year’s Black Hat® conference is right around the corner. Now, amazingly, in its 20th year, Black Hat is one of the world’s top gathering of information security professionals. Friends in the industry refer to this as “Security Summer Camp” and it’s true, between the training, briefings, arsenal, and business hall, Black Hat is chocked…

Read More
SecurityTrendMicro

What to Consider When Choosing a Security Vendor

Credit to Author: Ryan Delany| Date: Mon, 17 Jul 2017 16:27:11 +0000

While it sounds similar to Business Email Compromise, Business Process Compromise is an entirely new beast.Picking a security vendor for your managed service business should be about business model alignment, not product cost. If you’re a seasoned managed service provider (MSP), you are already very familiar with the benefits of the pay-as-you-go business model. In fact, it’s most likely how you sell your services to your customers. But, have you…

Read More
SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of July 10, 2017

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 14 Jul 2017 12:00:02 +0000

Before the world of laptops, tablets and smart phones, some of us had to use paper-based solutions to keep track of our calendars and to-do lists. I used a Franklin Planner, where I kept track of my calendar as well as my never-ending to-do list. The Franklin Planner used the “ABC” system to help you…

Read More
SecurityTrendMicro

Security for a Rapidly Changing World: Why XGen™ is Our Formula for Success

Credit to Author: Eva Chen| Date: Tue, 11 Jul 2017 18:21:52 +0000

Right now, we’re living through a period of almost unprecedented technological change. It can be easy sometimes to get caught up in the excitement of this change and miss the bigger picture; the wider themes that tie our past to our future. That’s why at Trend Micro we’re proud to have been able to execute…

Read More
SecurityTrendMicro

Not All Threats Are Created Equal

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Tue, 11 Jul 2017 12:00:11 +0000

Macs have become more vulnerable as their collective market share has increased.In today’s world, security teams are bombarded constantly with security events and threat information from multiple sources, making it impossible to address each threat with the same amount of urgency. Where does one even start? We know every threat should be addressed, but not all threats are created equal. How do we determine which ones…

Read More