• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for August 2015

The Decline of Email Spam?

  • Posted on:August 31, 2015
  • Posted in:Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

As threat defense experts, Trend Micro has been delivering quarterly security roundup reports for several years now. Each quarter we look back on the previous quarter to highlight the key threats found during that time period. We also review the threat data we collect and analyze from the Trend Micro™ Smart Protection Network™ which gives…

Read More

Cloud to Desk: Advanced Security for the SDDC

  • Posted on:August 28, 2015
  • Posted in:Business, Cloud Security, Security, Virtualization
  • Posted by:
    Mike Smith
0

VMworld 2015 kicks off this weekend in San Francisco and one of the big things attendees are anxious to hear more about is how organizations have started relying on VMware NSX as the centerpieces of their software-defined data centers. In a recent interview with Virtualization Review, VMware CEO Pat Gelsinger shared that, “According to IDC,…

Read More

This Week in Security News

  • Posted on:August 28, 2015
  • Posted in:Current News
  • Posted by:
    Gavin Donovan
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for…

Read More

Introducing Trend Micro Deep Security 9.6

  • Posted on:August 25, 2015
  • Posted in:Cloud Security, Security, Virtualization, Vulnerabilities
  • Posted by:
    Mike Smith
0

As many of you already know, Trend Micro Deep Security delivers a comprehensive security platform optimized for the virtual and cloud environments. Deep Security 9.6 was recently launched and builds upon a rich history of being the only true single security platform with advanced threat protection capabilities built to work seamlessly with key virtualization and…

Read More

Back-to-School Time: Is Your Child’s Mobile Device Secure?

  • Posted on:August 25, 2015
  • Posted in:Consumer, Mobile Security, Security
  • Posted by:
    Susan Orbuch
0

Once upon a time, the back-to-school weeks used to involve parents buying their children new shirts, pants, and shoes for the year ahead. But times have changed. Today, it’s more likely anxious moms and dads are investing significantly more of their hard earned dollars into laptops, smartphones, and tablets for their little ones. But while…

Read More

Trend Micro Continues Stellar Test Results Performance

  • Posted on:August 23, 2015
  • Posted in:Internet Protection, Internet Safety, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

In the world of cybersecurity, many individuals and organizations rely on 3rd party testing as a gauge of how a vendor can protect them from cyber threats. Trend Micro has consistently worked with many of the most respected testing labs over the years to ensure our customers see how we stack up against our peers…

Read More

This Week in Security News

  • Posted on:August 21, 2015
  • Posted in:Current News
  • Posted by:
    Gavin Donovan
0

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for…

Read More

Hacking Team: The Android Connection

  • Posted on:August 20, 2015
  • Posted in:Consumer, Mobile Security, Security
  • Posted by:Christopher Budd (Global Threat Communications)
1

In the crush of news about the Hacking Team attacks and the subsequent flurry of vulnerabilities, mainly affecting Adobe, there was one piece of critical information for Android users that many have overlooked. Among the tricks and tools that we’ve discovered the Hacking Team has at their disposal is a particularly nasty piece of Android…

Read More

Securing VMware Virtual Desktop Infrastructure (VDI)

  • Posted on:August 20, 2015
  • Posted in:Cloud, Cloud Security, Security, Virtualization
  • Posted by:
    Mike Smith
0

Bringing VMware NSX and Horizon together with Trend Micro Deep Security For years virtual desktop infrastructure (VDI) has been a popular virtualization option for many organizations and VMware customers have relied heavily upon Trend Micro Deep Security to secure these environments. VMware and Trend Micro have been working together to continue to evolve and advance…

Read More

Cloud Security: Responsibility is best when it is shared

  • Posted on:August 19, 2015
  • Posted in:AWS, Security
  • Posted by:
    Justin Foster
1

“To sing a duet together means sharing with someone both the pleasure and the responsibility.” – Andrea Bocelli When you move your workloads to Amazon Web Services, you unlock world-class physical security, power, cooling, global network connectivity. You don’t need to concern yourself with keeping people out of the data center, or access and background…

Read More
Page 1 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Trend Micro Asks Students How Their Relationship to the Internet Has Changed During COVID-19
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.