TrendMicro

SecurityTrendMicro

The Shared Responsibility Model

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Tue, 22 Oct 2019 13:05:29 +0000

Hands in for support/sharinga

I’m often asked what the biggest cyberthreats are in the cloud. When people pose that question, they seem to be expecting an answer on par with a Hollywood movie plot. The truth is far simpler. The number one threat in the cloud today is service misconfigurations. Despite the cloud’s clear operating model, teams continue to…

The post The Shared Responsibility Model appeared first on .

Read More
SecurityTrendMicro

Trend Micro Acquires Cloud Conformity

Credit to Author: Trend Micro| Date: Mon, 21 Oct 2019 12:31:14 +0000

Developers who are responsible for managing their business’s IT infrastructure day-to-day often have to work with the technology providers they’re given. Our goal is to make sure our security solutions work for developers, providing seamless, automated security, rather than a roadblock to work around so you can do your job. Today’s acquisition of Cloud Conformity…

The post Trend Micro Acquires Cloud Conformity appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: Trend Micro Launches its XDR Center in India and EU Reports 5G Cybersecurity Risks

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 18 Oct 2019 13:03:42 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Trend Micro’s new XDR Center in India that will help solve data sovereignty issues. Also, read about 5G network software use being a top security…

The post This Week in Security News: Trend Micro Launches its XDR Center in India and EU Reports 5G Cybersecurity Risks appeared first on .

Read More
SecurityTrendMicro

This Week in Security News: How a Partnership can Advance DevSecOps and Cybersecurity Issues in the Midwest and South U.S.

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 11 Oct 2019 13:05:59 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how Trend Micro’s partnership with Snyk will advance DevSecOps. Also, read about cyber attacks affecting hospitals in Alabama and Indiana as well as disregarded cybersecurity…

The post This Week in Security News: How a Partnership can Advance DevSecOps and Cybersecurity Issues in the Midwest and South U.S. appeared first on .

Read More
SecurityTrendMicro

Tackling the BEC Epidemic in a New Partnership with INTERPOL

Credit to Author: erinj| Date: Wed, 09 Oct 2019 13:45:45 +0000

In just a few short years, Business Email Compromise (BEC) has gone from a peripheral threat to a major cyber risk for organizations. It’s making criminal gangs millions of dollars each month, hitting corporate profits and reputation in the process. Trend Micro has built a formidable array of resources over the past few years to…

The post Tackling the BEC Epidemic in a New Partnership with INTERPOL appeared first on .

Read More
SecurityTrendMicro

Whats So Strategic About the Trend Micro and Snyk Partnership?

Credit to Author: Trend Micro| Date: Tue, 08 Oct 2019 12:10:46 +0000

What does a partnership between Trend Micro and Snyk mean for you, the customer? Can you really develop and deploy applications anywhere without security slowing you down? Greg Young, VP of Cybersecurity for Trend Micro, explains how the partnership benefits Trend Micro and gives our customers an extra edge in their security platform.

The post Whats So Strategic About the Trend Micro and Snyk Partnership? appeared first on .

Read More
SecurityTrendMicro

Decrypting What Zero Trust Is, And What It Likely Isn’t

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Fri, 04 Oct 2019 17:33:56 +0000

https://blog.trendmicro.com/answers-to-your-questions-on-our-mac-apps-store/

It’s always an indicator of confusion when instead of hearing “I want Q” I’m asked “what is Q?”. In this case the ‘Q’ is Zero Trust.  I’ll try and give my best take on what I understand Zero Trust to be. History Repeats Let’s start with the background. Quite a while back the Jericho Forum…

The post Decrypting What Zero Trust Is, And What It Likely Isn’t appeared first on .

Read More
SecurityTrendMicro

Answering IoT Security Questions for CISOs

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Fri, 04 Oct 2019 16:17:47 +0000

Given the permeating nature of IoT and Industrial IoT devices in our daily lives, from smart homes to smart cities, one cannot escape the growing cybersecurity risks associated with these devices. It might leave CISOs with a lot of questions about how this newer, growing attack vector could impact their business. We hope to answer…

The post Answering IoT Security Questions for CISOs appeared first on .

Read More