• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for January 2016

This Week in Security News

  • Posted on:January 29, 2016
  • Posted in:Current News
  • Posted by:Christopher Budd (Global Threat Communications)
1

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for…

Read More

Customer Perspective: Five Questions with the Norman Alan Company

  • Posted on:January 28, 2016
  • Posted in:Business, Partners, Security, Small Business
  • Posted by:
    Ryan Delany
0

The Norman Alan Company has built its name over the past 11 years by providing a common sense approach to IT for its customers. Founded in 2004, the IT support company focuses its efforts on small businesses which may have been poorly served in the past. Making a name for itself in the Pittsburgh metro…

Read More

AV-Test: Trend Micro Maintains Top Spot in Endpoint Protection

  • Posted on:January 27, 2016
  • Posted in:Business, Security
  • Posted by:
    Andrew Stevens
0

The pressures most IT security managers are under today don’t give them much time to do detailed due diligence on their endpoint protection vendors. That’s why independent testers have become so important. And with increasing numbers of vendors and products crowding the endpoint security marketplace – some claiming their technology is more ā€˜advanced’ or ā€˜next…

Read More

Converged Sales: How the Channel Can Profit from Next-Gen Data Centers

  • Posted on:January 27, 2016
  • Posted in:Cloud Security, Partners
  • Posted by:
    Partha Panda
0

Data centers across the country are transforming before our very eyes. The journey to the cloud each organization takes is different, but convergence is a common thread. Driven by the need to reduce complexity and cost for the end customer, the ā€œconverged stackā€ is becoming an increasingly popular way to offer pre-configured product bundles for…

Read More

How safe do personal assistants keep user data?

  • Posted on:January 25, 2016
  • Posted in:Industry News
  • Posted by:
    Noah Gamer
1
Digital assistants are not without their cyber threats.

The ease of access that makes digital personal assistants so useful may also be precipitating privacy issues.

Read More

The most prominent cyber threats faced by high-target industries

  • Posted on:January 25, 2016
  • Posted in:Industry News
  • Posted by:
    Noah Gamer
0
Health care, education, government, retail and finance are always in hackers' cross hairs.

Let’s take a closer look at some of the prominent cyber threats faced by highly targeted industries.Ā 

Read More

The importance of having cybersecure point-of-sale systems

  • Posted on:January 25, 2016
  • Posted in:Industry News
  • Posted by:
    Noah Gamer
0
It's important to secure point-of-sale systems.

Why should businesses be worried about point-of-sale security? Let’s take a look.

Read More

What not to do in 2016: A list of “don’ts” for CIOs

  • Posted on:January 25, 2016
  • Posted in:Industry News
  • Posted by:
    Noah Gamer
0
How should CIOs approach cyber security in the new year?

Here are the top five things executives shouldn’t do when they are looking at their security for the coming year.

Read More

The inside job: How hackers are stealing data from within

  • Posted on:January 25, 2016
  • Posted in:Industry News
  • Posted by:
    Noah Gamer
0
Is your company safe from internal threats?

Trend Micro’s InterScan Web Security Virtual Appliance can help you monitor and manage the Internet activity of your employees.

Read More

Cloud App Security now Included Free with Smart Protection Complete

  • Posted on:January 25, 2016
  • Posted in:Cloud Security, Small Business
  • Posted by:
    Chris Taylor
0

Trend Micro Smart Protection Complete delivers multiple layers of security including endpoint, email and collabortion, and web. Now you can extend this security to SaaS applications, such as Office 365, with Trend Micro Cloud App Security. All Smart Protection Complete customers, both existing and new, are now entitled to Cloud App Security for no additional…

Read More
Page 1 of 412 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRNĀ® Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Nuffield Health Depends on Managed XDR with Trend Micro Vision One
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.