TrendMicro

SecurityTrendMicro

Challenges and Opportunities for 2017: Trend Micro Global Research Peels Back the Layers

Credit to Author: Raimund Genes (Chief Technology Officer)| Date: Tue, 14 Mar 2017 12:00:08 +0000

The year 2017 could be a pivotal moment for cybersecurity in Europe. And that’s thanks to two things: alleged state-sponsored interference in forthcoming national elections in the region, and looming European data protection laws. Both have escalated the issue of online threats and data security right up to board level, in Europe and the U.S….

Read More
SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 6, 2017

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 10 Mar 2017 13:00:08 +0000

According to Reference.com, the saying that “everything is bigger in Texas” likely originated as a reference to the state’s huge geographical area. Texas is second only to Alaska in size, but it is the largest of the contiguous 48 states. I am a native Texan (big hair and all) and it’s exciting to have a…

Read More
SecurityTrendMicro

The Culture of Cybercrime in West Africa

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Thu, 09 Mar 2017 11:00:52 +0000

As part of our ongoing research into the cybercriminal underground markets of the world, Trend Micro researchers today released a report detailing Cybercrime in West Africa. This report leverages our ongoing partnership with INTERPOL to provide survey data and a deeper understanding of the regions cybercriminal ecosystem. While tactics play a role in the success…

Read More
SecurityTrendMicro

How to Secure Your Enterprise

Credit to Author: Raimund Genes (Chief Technology Officer)| Date: Wed, 08 Mar 2017 14:00:20 +0000

This year, keep your company protected from cyber criminals.Over the past decade, the threat landscape has evolved extensively from the beginnings of worms in 2001 to botnets and spyware in 2005. Now, targeted attacks, mobile threats and destructive crypto-ransomware are a daily reality. The damage caused by these threats has escalated, as well, to potentially crippling levels for an impacted organization. To mitigate…

Read More
SecurityTrendMicro

Deep Security 10: Customer Driven Development with TRC

Credit to Author: Justin Foster| Date: Wed, 08 Mar 2017 13:00:53 +0000

At least that used to be the standard software development process. Customers were involved in feedback quite late in the development process, often after the release has been mostly formed. We recently shared how Deep Security 10 is an example of server security standing the test of time but it was also the first release…

Read More
SecurityTrendMicro

Trend Micro Protects Its Customers in 2016

Credit to Author: Jon Clay| Date: Tue, 07 Mar 2017 14:00:41 +0000

Much of the data that is included in our 2016 security roundup report, A Record Year for Enterprise Threats, comes from the Trend Micro™ Smart Protection Network™ infrastructure. This is where our global threat intelligence resides and where we provide much of our protection capabilities for our customers. Trend Micro has 500,000 commercial customers and…

Read More