In Africa, crocodiles are considered to be the most fearsome predators. These ancient beasts are superb hunters because of their strength and hunting tactics. One of those tactics involves the stalking of watering holes in the savanna. This method of tactic is implemented because the wildebeests and gazelles congregate at watering holes. This tactic is…
Read MoreCloud-based applications have continued to grow exponentially. The majority of people are now interacting with cloud-based data and applications in one way or another, likely through social media such as Facebook, LinkedIn, etc. This comfort level is extending to business applications as well. IT and security professionals…
Read MoreAttack trends in 2014 are shaping up to bring data breaches, vulnerabilities and online banking malware to the forefront. In ourĀ 2Q 2014 Security Roundup Report: Turning the Tables on Cyber AttacksĀ our research shows these are the most notable and important security and privacy events of the year. Data breaches in particular are moving from…
Read MoreIn 20 years from now, Googleās announcement that it will give priority ranking to SSL-enabled sites, will be seen as a key milestone that catalyzed a change in most (if not all) traffic on the Internet. On August 6th, Google announced a change to its ranking algorithm, stating that it will now include the use…
Read MoreIn a world of advanced targeted attacks, stationary security budgets and determined, well-resourced cyber foes, the security software you choose can have a major impact on your organizationās bottom line. Effective detection is a critical success factor to any organization seeking to protect their data, intellectual property and communications. Thatās why weāre thrilled that NSS…
Read MoreSSL ā the encryption of communications using digital certificates – is a fundamental building block on the Internet to enable trusted transactions. If your organization currently uses Internal Domain Names and you secure these sites with SSL certificates from a public Certification Authority (CA), then you will need to make some significant changes to your…
Read MoreHere you will find the latest blogs from Trend Microās experts along with a comprehensive look at how the media has covered this data breach. We encourage you to scroll through the various blogs, provide comments and enjoy the in-depth knowledge that Trend Micro has to offer. August 8, 2014 IT Nation(a Luxembourg online IT…
Read MoreThe recently disclosed Russian hack in which a Russian cyber gang stole billions of passwords from both commercial websites and consumers highlights the challenges we all face in our day to day activities on the web. Cyber thieves are targeting us all in their quest to make money and as we’ve talked about before, the…
Read More