Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:


  • Recent Posts

  • Calendar

    July 2015
    S M T W T F S
    « Jun    
     1234
    567891011
    12131415161718
    19202122232425
    262728293031  
  • Email Subscription

  • About Us


    Archive for the ‘CTO Insights’ Category




    Last month, there was a very interesting decision out of the European Court of Justice. The decision established what can be called the "right to be forgotten". People can now ask search engines like Google to remove links from search results about them. So, for example, say you are now a successful businessman. However, the first search results for your name is a slightly embarrassing incident that took place in your youth. Now, you can ask Google to "forget" about that incident so it won't ...

    Posted in CTO Insights | Comments Off on Privacy and the Right to be Forgotten



    Today's technology is becoming better and better at an exponential clip. It was only a few decades ago that we had cellphones the size of bricks and Internet the speed of which is only a fraction of a single percent of today's connections. Now we carry powerful computers in our pockets as well as wear them for watches, and we can download entire libraries in less than a couple of moments. But with all benefits there are prices to pay for ...

    Posted in CTO Insights | Comments Off on Data Gathering Is a Two-Way Street



    It is an interesting time to be in IT security today. PRISM and Edward Snowden taught many lessons about how companies should secure their data. There's been a lot of discussion about the surveillance aspect of this, but consider this whole affair from the side of the NSA. To the NSA, this was a data breach of unprecedented proportions. All indications are that Snowden was able to exfiltrate a significant amount of classified data; what has been published so far represents ...

    Posted in CTO Insights, Targeted Attacks | Comments Off on Advice for Enterprises in 2014: Protect Your Core Data



    There is no doubt that mobile banking is going to become very significant in 2014, if it isn't already. In the United States, a quarter of all people selecting a bank say mobile banking is a "must-have". In parts of the developing world, mobile banking is even the dominant form of banking. There is no doubt anymore that mobile banking is a big part of the banking landscape - which means, of course, that it is bound to become a big ...

    Posted in CTO Insights, Mobile | Comments Off on Mobile Banking and the Risks



    The past year has been an interesting one in the world of cyber security. Mobile malware has become a large-scale threat, government surveillance has users asking "does privacy still exist?", cybercrime continues to steal money from individuals and businesses, and new targets for hackers like AIS and SCADA have been identified. 2013 was many things, but boring was not one of them. So, what do we have to look forward to in 2014 and beyond? We expect mobile malware to not just ...

    Posted in CTO Insights | Comments Off on 2014 Predictions: Blurring Boundaries


     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice