Essilor is the world leader for corrective lenses with offices in over 100 countries. In line with their mission to “improve lives by improving sight,” the company develops a wide range of lenses to correct and protect eyesight, from design to manufacturing. With 55,000 employees, 22 manufacturing plants and 400 laboratories globally, the IT infrastructure landscape comprised…Read More
It’s no understatement to say the cloud computing is revolutionizing the way we live and work. From a corporate perspective, tools like the hugely popular Office 365 are making organizations more agile, productive and cost efficient than ever before. But there are risks and that’s why we built Cloud App Security – a comprehensive security…Read More
Today, we are proud to announce our partnership with a joint effort involving the Federal Bureau of Investigation (FBI) and security researchers from other security vendors to take down multiple command-and-control (C&C) servers used by the DRIDEX botnet in the US. This follows action taken recently by the National Crime Agency (NCA) in the UK against…Read More
When an enterprise partners with a cloud service provider (CSP) they entrust their data to a third party. This level of trust places the burden of security on the CSP to ensure their customers’ data is totally safe from potential threats. At Trend Micro, we support CSPs in their effort to prevent data loss or…Read More
Here you will find the latest blogs from Trend Micro’s experts along with a comprehensive look at the latest zero-day exploit affecting all versions of Adobe Flash Player. We encourage you to scroll through the various blogs, provide comments and enjoy the in-depth knowledge that Trend Micro has to offer. Please add your thoughts in…Read More
It’s everywhere, it’s seemingly unstoppable, and it’s growing by the day. That, in a nutshell, is how most of us view malware – and with good reason.
Over 317 million new malware samples were uncovered in 2014.
Career websites have become natural targets for cyber criminals because they receive so much traffic.
Punishing cyber crime is about two things: Holding the guilty accountable, and deterring others from following suit.
As the threat landscape grows, many are wondering why a database doesn’t exist for malware samples.