The consequences of cybercrime can be particularly profound within large corporations, yet in several respects, protection practices are still lagging behind at the corporate level.Read More
Birds are beginning to leave their nests and fly south as winter slowly encroaches. The migration of our feathered friends ushers in the new season. As the seasons change so to have the targeted attacks in 2012. The surge of targeted attacks against remote users is exacerbating the Cybersecurity landscape. Remote access compromises are again…Read More
Rove Digital was a company formed by a criminal organization in Estonia with two business models: one to portray itself as a legitimate business on the surface, but the second and main purpose was to profit from cyber-criminal activities, which they were extremely successful at and did for many years. At GovSec West this week,…Read More
By Tony Larks, Vice President, Global Consumer Marketing, Trend Micro This week three of the most notorious malware families have been spotted to work together on a global scale to create one single attack. The three variants identified by TrendLabs, the heart of Trend Micro’s threat research, are dressed in popular files, hidden in email…Read More
One big part of cyber security that many people didn’t start to think about until recently was mobile security and BYOD (Bring your own Device), but the trend has been undeniable in the corporate world.
Today at Interop New York, I am discussing “Where to Store the Cloud Encryption Keys.” The topic centers around the core cloud management decisions, which I’ve whittled down to eight key considerations. To help with those decisions, I’ve created the Cloud Management Key Decision Matrix to help establish a clear path between those considerations and…Read More
A Senate subcommittee has suggested the DHS’ intelligence sharing initiatives have been largely ineffective and may be compromising personal privacy in the process.
Times are changing in the online security world, and it may be time for the baby boomer generation to freshen up on what that means for them.
As companies adopt BYOD (Bring your own Device) policies and employees take advantage of the increased portability and convenience of smartphones and tablets, mobility has taken center stage in the modern workplace.