Most parents today have probably breathed a sigh of relief at some point or other that they never grew up with the Internet, or social media. Not so for our little ones, of course, who as ‘digital natives,’ seem to take the net fully in stride with self-confidence and a gung-ho swagger that can be…Read More
Continuous monitoring is not just a nice thing to have in today’s hostile threat landscape – it’s been at the heart of a White House initiative to harden the US government and its agencies from cyber attack since 2010. These attacks have become more successful, more sophisticated and better resourced than ever before. They may…Read More
In the United States on October 1, 2013 a major provision of the Affordable Care Act (also popularly known as “Obamacare”) goes into effect. The Health Insurance Exchange will go live. These sites are where people will be able to sign up for health care coverage themselves rather than through their employer. One way people…Read More
CloudPlatform an open source platform which allows large enterprises and cloud service providers to build out public, private and hybrid Infrastructure-as-a-Service (IaaS) clouds
In the future, perimeter security will need to be supplemented by measures that specifically address vulnerabilities like Web applications and mobile device access.
Today we’re releasing the first of a new, regular, quarterly report on targeted attacks (some of which are also connected to Advanced Persistent Threats (APTs) campaigns). Each quarter, this report will detail trends we’ve observed as well as go in-depth on one particular APT campaign. This first report focuses on the second quarter of 2013…Read More
We started Trend Micro when the Internet was in its infancy and, even then, we aspired to make the world a safer place for sharing digital information. Twenty-five years later, the Internet continues to evolve – and so do we. We have emerged as the largest company in the world solely focused on cyber security…Read More
We all know the information security landscape is ever changing – a cursory look back at the biggest threats facing IT chiefs even 24 months ago will tell us that. Today’s cyber criminals are more sophisticated, motivated and well-resourced than ever before and they’re looking to compromise virtually every part of our infrastructure. This requires…Read More
Hardly a historical target for cyber-criminals, automobiles have recently entered the cyber security spotlight as hackers devote new attention to the microprocessors and sophisticated engine control units in modern vehicles.
As intelligence efforts widen in scope to deal with cybersecurity in addition to physical security, data sharing practices must evolve and draw in organizations of all sizes.