• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for April 2012

BYOD Best Practices – Three pitfalls you can’t afford to ignore

  • Posted on:April 30, 2012
  • Posted in:Mobility
  • Posted by:
    Trend Micro
10

In a previous post1 I raised three pitfalls that your BYOD program cannot afford to ignore when allowing employees to use their personal devices for work: Remote deletion of personal data on an employee-owned device Tracking an individual’s location Monitoring an employee’s Internet access Based on my involvement with various BYOD projects and my ongoing…

Read More
Tags: BYODCesare GarlaticonsumerizationMobile Device ManagementMobile SecuritypoliciesPrivacysmartphonestablets

The Flashback Trojan – Time for Mac Users to Get Serious about Security

  • Posted on:April 27, 2012
  • Posted in:Security
  • Posted by:
    Richard Medugno
1

  By Rik Ferguson ( Photo by: Leif Martin Kirknes, Computerworld Norway) Mac users have for many years laboured under the misapprehension that their machines are inherently more secure than PCs. For a long time, while Microsoft-powered PCs enjoyed stellar success, there was no real way to dispute this theory as time and again Windows…

Read More

Cloud Security Symposium Coming Up with Cloud Security Alliance Leader

  • Posted on:April 26, 2012
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

Trend Micro is putting on a pretty cool, free event for virtualization and security industry leaders. We’re doing interactive roundtables and presentations to help IT people learn how to protect your data when using new innovative computing environments represented today by virtualization and cloud architectures. Our presenters will share how progressive business and IT leaders…

Read More

Replay of the Privacy and Security Panel from Cloud Computing Conference at NAB 2012

  • Posted on:April 26, 2012
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

I was on a panel at the DCIA Cloud Computing Conference at the NAB show in Las Vegas. You can hear the entire panel here. The topic was Privacy Issues, Reliability Questions, Security Concerns in the Cloud Computing Space, and the panel included: Dave Asprey, VP, Cloud Security, Trend Micro Tom Mulally, Consultant, Numagic Consulting…

Read More

iSurvived, iThink?

  • Posted on:April 26, 2012
  • Posted in:Mobility
  • Posted by:
    Trend Micro
0

“We’ll have to send it out to a service facility,” said the Apple Store rep. “What kind of turnaround time are we talking about”? I asked. “Probably no more than 5 days.” Immediately I began calculating. Let’s see, today is Wednesday, so three more work days. What do I have coming up? I need to…

Read More

Security is essential to virtualization deployments

  • Posted on:April 25, 2012
  • Posted in:Virtualization
  • Posted by:
    Trend Micro
0

Keeping information safe has been one of today’s most challenging tasks for IT personnel, as new technologies and solutions evolve and become more widely utilized in the enterprise.

Read More
Tags: virtualization

Op-ed: Understanding FTC’s new consumer privacy protection guidelines

  • Posted on:April 25, 2012
  • Posted in:Privacy & Policy
  • Posted by:
    Trend Micro
0

In the internet age, data has become king. With most consumers now using mobile devices and social media to complete personal and work tasks, enterprises are leveraging these platforms to collect, store and share an abundance of information about prospective and existing customers.

Read More
Tags: Privacy

Report to Congress details FISMA compliance progress

  • Posted on:April 25, 2012
  • Posted in:Compliance & Regulations
  • Posted by:
    Trend Micro
0

The findings indicated that just seven of the 24 agencies surveyed have achieved greater than 90 percent compliance with FISMA protocol, with the average across all agencies standing at 72.8 percent.

Read More
Tags: Compliance & Regulations

Cybercrime sending shockwaves through financial sector

  • Posted on:April 25, 2012
  • Posted in:Cybercrime
  • Posted by:
    Trend Micro
0

According to PwC research, cybercrime is now the second most commonly reported economic crime affecting financial services firms.

Read More
Tags: cybercrime

Data protection should be top business priority

  • Posted on:April 25, 2012
  • Posted in:Current News
  • Posted by:
    Trend Micro
0

A data breach can have serious repercussions on a company, including fines, damaged reputation and even lawsuits.

Read More
Tags: Vulnerabilities - DO NOT USE
Page 1 of 512 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Digital Transformation is Growing but May Be Insecure for Many
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.