• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for April 2014

Flexibility: the key to securing your evolving IT strategy

  • Posted on:April 30, 2014
  • Posted in:Security
  • Posted by:
    Eric Skinner
0

Security versus flexibility: the two concepts have rarely been comfortable bedfellows. Allow too much flexibility, and security can become compromised, but focus too hard on security, and you may impact the effectiveness of the IT team. Today’s IT managers know only too well that most of the products they use don’t strike the right balance…

Read More

Security On Azure

  • Posted on:April 24, 2014
  • Posted in:Cloud, Partners, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

With any public cloud, security is a shared responsibility between the cloud service provider and you, the user of those services. For IaaS offerings, this usually means the division of responsibilities is as follows:   Cloud Service Provider You Facilities Physical security Network infrastructure Virtualization layer Operating system Applications Data   If you’ve done work…

Read More
Tags: azureCloud SecurityMicrosoft

Getting Up to Speed on Azure

  • Posted on:April 22, 2014
  • Posted in:Cloud, Partners, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

Microsoft recently held their annual Build conference. The premier developer event for Microsoft is usually quite predictable. You could safely expect a few incremental improvements in various technologies and fantastic developer sessions on current tech. See for yourself; the sessions are online from 2012 and 2013. Things were different this year. I’ll be addressing the…

Read More
Tags: azureMicrosoft

Optimizing Security for AWS

  • Posted on:April 21, 2014
  • Posted in:Cloud
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

I recently hosted a webinar on optimizing security for AWS. The goal of the webinar was to help raise awareness of how security changes as you move to the AWS Cloud. I strongly believe that if you’re aware of the changes, you can actually build a stronger security posture for your deployments. The webinar runs…

Read More
Tags: AWSAWS best practicesCloud Security

Tools You Can Use to Protect Yourself from Heartbleed

  • Posted on:April 17, 2014
  • Posted in:Security
  • Posted by:
    Trend Micro
0

Last week, we said that the best things you can do to help protect yourself from the Heartbleed vulnerability were to make sure you’re running a security suite like Titanium, keep an eye on your accounts for unusual activity, and change your passwords when you’re told to by website operators. Today, we want to let…

Read More

Your Source for all Things Heartbleed

  • Posted on:April 17, 2014
  • Posted in:Security
  • Posted by:
    Trend Micro
1

Here you will find the latest blogs from Trend Micro’s experts along with a comprehensive look at how the media has covered this vulnerability. We encourage you to scroll through the various blogs, provide comments and enjoy the in-depth knowledge that Trend Micro has to offer.   April 17, 2014 Tools You Can Use to…

Read More

FakeAV in Google Play and how Trend Micro Mobile App Reputation Services Dynamic Analysis Helps Protect You

  • Posted on:April 16, 2014
  • Posted in:Security
  • Posted by:
    Warren Tsai
0

Only 4 months into 2014 and the Android malware problem continues to explode. Android malware and high risk apps have already reached the 2 million mark, putting us well on our way to our CTO’s prediction of 3 million pieces of malware and high risk apps (Diagram 1). In fact, in the first 3 months…

Read More

Trend Micro takes integrated protection to the next level with Complete User Protection solution refresh

  • Posted on:April 15, 2014
  • Posted in:Security
  • Posted by:
    Eric Skinner
0

Trend Micro has spent the past 25 years protecting its customers from the latest threats. Over that time, those threats, and the people behind them, have changed almost beyond recognition. Businesses have never before faced attacks on such a broad array of devices and applications as they do today, so we’ve got to keep improving….

Read More

Heartbleed Impacting the Deep Web?

  • Posted on:April 14, 2014
  • Posted in:Security
  • Posted by:
    JD Sherry (VP, Technology and Solutions)
0

News of this week’s massive and far reaching OpenSSL vulnerability “Heartbleed” has put all of us on our heels. In what I would call the equivalent of an Internet oil spill, individuals and organizations are scrambling to discover how to clean up this mess and get on with business as usual. This will not be…

Read More

Heartbleed – One Week In

  • Posted on:April 14, 2014
  • Posted in:Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

Heartbleed just got real. The bug has been dominating headlines for the past week – and rightfully so. The scale of the impact of this issue is major. OpenSSL has been integrated into a significant number of development projects. It’s probably the most commonly used security library out there. Late Friday night (the 11th of…

Read More
Page 1 of 212

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.