• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for September 2011

Electric vehicles take cybersecurity down new road

  • Posted on:September 1, 2011
  • Posted in:Current News, Vulnerabilities & Exploits
  • Posted by:
    Noah Gamer
0

A new study from analysis firm Pike Research indicated that the rise of electric vehicles will create demand for greater cybersecurity practices aimed at protecting the automobiles’ recharging infrastructure.

Read More
Tags: Vulnerabilities

Media tablet security practices lacking, study finds

  • Posted on:September 1, 2011
  • Posted in:Current News, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

These days, it’s nearly impossible to turn on the TV and not see a commercial for the newest tablet on the market. In the last year and a half, tablets have gone from a virtual unknown to one of the most talked-about technologies both in consumer and enterprise sectors.

Read More
Tags: Vulnerabilities

Mobile security threats evolve with devices

  • Posted on:September 1, 2011
  • Posted in:Current News, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

Mobile devices have come a long way in just the past few years. What began as a device for merely making mobile phone calls has morphed into a fully functional computer small enough to fit in one’s pocket.

Read More
Tags: Vulnerabilities

Cybersecurity executives may be on the horizon

  • Posted on:September 1, 2011
  • Posted in:Current News, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

As the number of cyber threats facing organizations in the both private and public sectors continues to grow, it may be time to introduce a new approach to warding off cyber attacks and protecting sensitive information.

Read More
Tags: Vulnerabilities

New threats, technology changing CSO priorities

  • Posted on:September 1, 2011
  • Posted in:Current News, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

The overarching duties and responsibilities of a chief security officer are often the same – protect the organization’s confidential information at all costs.

Read More
Tags: Vulnerabilities

Survey: More Companies entrusting email to the cloud

  • Posted on:September 1, 2011
  • Posted in:Spotlight
  • Posted by:
    Trend Micro
0

Plenty of data protection concerns continue to swirl around the cloud. Whether real or perceived, a company’s notions about the technology could directly determine how, if at all, it is implemented.

Read More
Tags: cloud computing security
Page 8 of 8 « ‹ 78

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Cloud-based Email Threats Capitalized on Chaos of COVID-19
  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.