• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for February 2015

And the AV-Test Institute “Best Protection 2014” Award Goes to Trend Micro Internet Security!

  • Posted on:February 19, 2015
  • Posted in:Security
  • Posted by:
    Richard Medugno
13

Pardon us for this, but sometimes we just have to brag a little. Trend Micro™ Internet Security was just named the “Best Protection” of 2014 against viruses and other threats. We’re proud of this recognition for our continuous work to safeguard our customers against today’s online threats. It is Hollywood’s award season, and even though…

Read More

The CISO Search: Finding the Right Person for the Hardest Job in Tech

  • Posted on:February 18, 2015
  • Posted in:Security
  • Posted by:
    JD Sherry (VP, Technology and Solutions)
0

The role of the chief information security officer has come a long way since the early days of the cybersecurity industry. As the value of sensitive data has grown – to organizations and cybercriminals alike – so has the position of CISO, in a way barely even imagined a decade ago. Firms like Target, JPMorgan…

Read More

Five Questions with The University of New Brunswick

  • Posted on:February 17, 2015
  • Posted in:Partners, Security
  • Posted by:
    JD Sherry (VP, Technology and Solutions)
0

At Trend Micro, we’re constantly learning from our customers; from the challenges they’re facing to their strategic security postures, they each hold a treasure trove of hard-earned wisdom. In an effort to share some of this wisdom, we’ll be interviewing some of our most noteworthy customers for a new blog series we’re calling “Five Questions.”…

Read More

For a Greater Goal

  • Posted on:February 17, 2015
  • Posted in:Security, Social, Trend Spotlight
  • Posted by:
    Trend Micro
0

In the coming months, we’ll be sharing some exciting details and announcements around this year’s FIFA Women’s World Cup Canada 2015™.  As a National Supporter of the tournament, Trend Micro will be further aligning its corporate culture with an outstanding organization. The celebration of these world class female athletes will begin June 6 and run…

Read More

Trend Micro awarded “Best Protection” by AV-Test Institute

  • Posted on:February 17, 2015
  • Posted in:Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

Trend Micro has been working with many security industry testing labs over the years to provide our customers the best possible security solutions through the following: Benchmark testing against our peers in the industry to ensure we rank in the top-tier of results Improve our solutions by analyzing the missed samples from regular testing Collaborate…

Read More

Cybermilitiaman? Cybercriminal? Both?

  • Posted on:February 16, 2015
  • Posted in:Security
  • Posted by:Christopher Budd (Global Threat Communications)
0

“Some of our youth are extremely clever. I hope that a group of hackers will get together, and will wage resistance over the Internet, targeting Israeli and Zionist sites and destroying them electronically.” – Tareq Al-Suwaidan, Muslim Brotherhood Cybermilitiamen are supposedly independent attackers who carry out cyberattacks in a virtual war on behalf of state…

Read More

The White House Summit on Cybersecurity and Consumer Protection: What it Means and Why it’s Important

  • Posted on:February 12, 2015
  • Posted in:Security, Uncategorized
  • Posted by:Tom Kellermann
3

IT security experts, tech leaders, government agencies and other industry notables will be making their way to Stanford University tomorrow for the White House Summit of Cybersecurity and Consumer Protection. The President first mentioned cybersecurity in May 2009 during a White House Rose Garden speech when he referred to it as ”the greatest national security…

Read More

Don’t Be a Data Breach Victim: Appoint a CISO Before It’s Too Late

  • Posted on:February 11, 2015
  • Posted in:Security, Uncategorized
  • Posted by:
    JD Sherry (VP, Technology and Solutions)
0

No one knows what the future holds, but it’s a pretty safe bet to say 2014 will become known as the “Year of the Data Breach.” Yet amid the finger pointing, the executive culls and inevitable media coverage, there’s another interesting trend: several of the firms compromised by hackers didn’t have a functioning chief information…

Read More

Cyber security and the Super Bowl: What can enterprises learn?

  • Posted on:February 11, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

The Super Bowl is often a good indicator of trends in consumer technology and cyber security.

Read More

Identifying and containing new cyber security risks in the Internet of Things

  • Posted on:February 10, 2015
  • Posted in:Current News, Industry News
  • Posted by:
    Trend Micro
0

The scope of the Internet of Things makes it a central cyber security concern.

Read More
Page 2 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Digital Transformation is Growing but May Be Insecure for Many
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.