With the launch of episode five today we’re now over halfway through 2020: the Series, Trend Micro’s visionary online video project taking a sneak peek at how cyber-crime might evolve at the end of the decade. If you haven’t logged on yet, click through now to watch the story so far and follow the dramatic…Read More
VP, Security Research
- Rik is actively engaged in research into online threats and the underground economy. He also researches the wider implications of new developments in the Information Technology arena and their impact on security both for consumers and in the enterprise, contributing to product development and marketing plans. Recognized as an industry thought leader and analyst, Rik is regularly quoted by the press on issues surrounding information security, cybercrime and technology futures by trade, national and international media. Follow Rik on Twitter.
Picture the scene: it’s the end of the decade. You live in a world where technology has become even more embedded into the fabric of society than it is today. You consume personalized content delivered to a headset or beamed directly onto your eyeball thanks to specially designed contact lenses. Everything in this brave new…Read More
Have you ever wondered what life might look like at the end of the decade? How will we socialize? How will we consume goods and services? How will technology influence our lives and what might happen if the bad guys do their worst? At Trend Micro we make it our job to ask those difficult…Read More
Today sees the launch of episode two in Trend Micro’s innovative Project 2020 series of web videos. Project 2020 is our take on what society might look like at the end of the decade, how technology will shape that society and what could happen when the bad guys try to subvert it. We’re not saying…Read More
Can you imagine what our society will look like at the end of the decade? How will we shop, socialize and consume services? How as businesses will we authenticate customers, manage our services and protect critical data from a growing array of increasingly sophisticated and determined adversaries? Of course, we don’t have all the answers…Read More
With the launch announcements of various Google Chrome OS netbooks, the focus of the press and security companies alike is beginning to take a closer look at the security promises made and also at some of the more ’media friendly‘ statements such as, “…users don’t have to deal with viruses, malware and security updates”.
2009 has been a notable year for malware and malicious online activity for a number of reasons and several of them relate to what is known as botnets. A zombie, or a bot, is a PC infected by malware that brings it under the remote control of a criminal. Criminals run networks that can range…Read More
When your servers are in the cloud, then your own perimeter provides no protection, the security is often “lowest common denominator security” which undermines both confidence and compliance. Co-location of virtual instances and data with that of strangers, competitors and possibly even malicious actors (we have already seen criminal activity being hosted in Amazon’s EC2…Read More