Hey, did you forget that it is October is National Cyber Security Awareness Month? Yeah, I know the month’s almost over and it totally slipped my mind too. But it’s not too late to celebrate it. Here are a couple of suggestions: You could maybe have “Password Strong” tattooed to your bicep. Or what if…Read More
With AWS re:Invent 2013 right around the corner, I know many of you have the cloud on your mind. Which makes me wonder – is security one of the cloud topics you are thinking about? Amazon Web Services (AWS) has definitely set high standards for security with its comprehensive set of administrative, physical and logical…Read More
Several recent cybercriminal busts have put The Onion Router network, and the “dark Internet” that it protects, out of the shadows and into the spotlight.
With the launch of episode five today we’re now over halfway through 2020: the Series, Trend Micro’s visionary online video project taking a sneak peek at how cyber-crime might evolve at the end of the decade. If you haven’t logged on yet, click through now to watch the story so far and follow the dramatic…Read More
The U.K. recently took the international and cybersecurity communities by surprise when it admitted to developing of offensive cyberwar capabilities.
Given the complexity of virtualized technologies and cloud-based implementations, which are often amalgams of infrastructure, software and developmental tools from a variety of vendors and open source projects, it is imperative that enterprises take the time to carefully vet their networks and software. The need for thorough testing is exacerbated by the growing number of Web-based attacks and outages affecting businesses across the globe.
Happy Halloween! Ready for a really good scare? Check out our latest infographic titled “The Scariest Cyber Security Threats.” Our clever team of researchers have created this creepy artwork by comparing the traditional frightening Halloween characters with their associated cyber threats. For example, vampires compare quite well to online banking Trojans that “suck cash out of your…Read More
Many organizations are still supporting a security model that was developed years ago and is not reflecting the changes needed to address today’s challenges, including the changes in the threat landscape, the changes in the economics, and the need to do more with less. The threat landscape has shifted from one where outbreaks, spam and…Read More
This week there’s a lot of talk about a “tech surge” to address issues with the healthcare.gov website. While that is to address issues specific to that site only, this focus on improvements around the Affordable Care Act’s (ACA) online experience is a good time to consider an important and necessary change to fundamentally improve…Read More
Technology opens opportunities for kids to access the world in ways that they may never otherwise have the ability to do. However, with the ease of sharing information online, kids often fail to see the future consequences of their present online activities, including the negative impact that irresponsible Internet use can potentially have on their…Read More