• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Author / Bob Corson

Bob Corson

Bob Corson is the Director, Solutions Marketing for Trend Micro. Bob's focus is to help enterprises comprehend, and expediently address, the growing strategic problem of targeted attacks and advanced threats. Prior to joining Trend Micro, Bob led the competitive intelligence practice for Business Intelligence and Data Integration at Oracle while providing strategic guidance and insight regarding cloud, enterprise and emerging markets. As Business Unit Executive, Product Marketing with IBM, Bob was responsible for working with SAP and Oracle enterprise business intelligence customers. Inclusive in this effort, Bob chaired an advisory board of Fortune 500 company's to identify and disseminate application of industry best practices and deployment methodologies. At Adobe, Bob created and managed an enterprise customer program for adoption of document management technology. During his tenure at Entrust, Bob worked closely with customers on enterprise security initiatives utilizing public key infrastructure. Bob is an experienced speaker having provided seminars, industry briefings and strategic guidance on enterprise technology across the globe. Bob holds an MBA from the University of Ottawa, a Graduate Certificate in International Business from ESC Rheims as well as an undergrad degree in Economics from Carleton University. Bob also has two certifications from Pragmatic Marketing, an ITILv3 certification and holds a Government of Canada Secret Security Clearance.

The Proof is in the Pudding

  • Posted on:August 3, 2016
  • Posted in:Security
  • Posted by:
    Bob Corson
0
New zero-day threats have been detected and patched.

If you follow the enterprise security market, you are no doubt inundated by vendors who claim they have the latest and greatest security capability. The challenge is discerning if these claims are substantive or snake oil. Ā At Trend Micro we like to stick to the facts about our products and what they can do.Ā  With…

Read More

Deep Discovery Catches a Wave as Forrester Names Trend Micro a Leader

  • Posted on:April 26, 2016
  • Posted in:Business, Network, Security
  • Posted by:
    Bob Corson
0

Since Deep Discovery entered the market in 2012, our ongoing investments and customer success have generated a number of key milestones: March 2013: Network Computing Awards Best New Product of the Year April 2014: Trend Micro Deep Discovery earns highest score in NSS Labs Breach Detection Testing November 2014: Trend Micro’s Deep Discovery wins Best…

Read More

No One-Trick Pony Please

  • Posted on:December 18, 2015
  • Posted in:Security, Targeted Attacks, Vulnerabilities
  • Posted by:
    Bob Corson
1

On December 8th, 2015 the International Computer Security Association (ICSA) announced the results of the advanced threat defense (ATD) solution certification testing. Given Trend Micro’s track record of active participation in industry tests such as, NSS Labs Breach Detection testing, the results of the ICSA test further demonstrates the detection efficacy of Deep Discovery. This…

Read More

Trend Micro to Acquire HP TippingPoint

  • Posted on:October 21, 2015
  • Posted in:Business, Partners
  • Posted by:
    Bob Corson
0

What next-generation IPS and breach detection mean to you Cyber adversaries aren’t paid to bypass the network. Instead, they want to obtain the ā€œpot of goldā€ by finding, copying and monetizing the data, intellectual property and sensitive communications that reside within your network. They accomplish this by researching, designing and executing purpose-built attacks that bypass…

Read More

Just the Facts – The Truth About Industry Tests

  • Posted on:August 4, 2015
  • Posted in:Security
  • Posted by:
    Bob Corson
0

As with any comparative analysis, the latest Breach Detection System (BDS) tests by NSS Labs, are about far more than the results, detection rates andĀ total cost of ownership (TCO) numbers.Ā Participating in a transparent and open evaluation provides existing customers, partners and prospects, as well as industry and financial analysts, with impartial information. In short, the…

Read More

What We Can Learn from the Adobe Class Action Lawsuit

  • Posted on:April 30, 2015
  • Posted in:Security, Targeted Attacks
  • Posted by:
    Bob Corson
0

This week, Adobe announced a settlement of a class action lawsuit that was filed against them as a result of a 2013 data breach. This followed a 2014 finding that Adobe’s conduct was a contributing factor to the damages sustained by the plaintiff; namely representatives of some of the three million credit or debit card…

Read More

Targeted Attacks: Is the Enemy at the Gate?

  • Posted on:April 20, 2015
  • Posted in:Security, Targeted Attacks
  • Posted by:
    Bob Corson
0

During a recent business trip to Tokyo, I was witness to a not-so-stealthy attack by none other than Godzilla. As you may conclude from the image above, at the time of the photo, part of Tokyo was spared the wrath of the large green monster thanks to a strong perimeter. Or was it? It struck…

Read More

To Respond to Targeted Attacks, You Must Detect the Unseen

  • Posted on:April 1, 2015
  • Posted in:Business, Security
  • Posted by:
    Bob Corson
0

If you have not done so already, go play Targeted Attack: The Game. As of late, this is the reason why I ponder earth shaking questions such as the connection between the two inanimate objects you see above and targeted attacks. However, my hope is that after breezing through a few paragraphs, you will come…

Read More

Advanced Threat Protection: Making Your Business Case

  • Posted on:December 17, 2014
  • Posted in:Security, Uncategorized
  • Posted by:
    Bob Corson
0

We all know the attention data breaches are generating. Yet what appears to be lacking in the dialogue about targeted attacks and advanced threats are the impacts that can result, and therefore, how to frame a business case. As an example, according to a recent study published by PWC, the average cost of a data…

Read More

Trend Micro Deep Discovery Receives a White Hat at BlackHat

  • Posted on:August 7, 2014
  • Posted in:Security
  • Posted by:
    Bob Corson
0

In a world of advanced targeted attacks, stationary security budgets and determined, well-resourced cyber foes, the security software you choose can have a major impact on your organization’s bottom line. Effective detection is a critical success factor to any organization seeking to protect their data, intellectual property and communications. That’s why we’re thrilled that NSS…

Read More
Page 1 of 212

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • New Report: Top Three Ways to Drive Boardroom Engagement around Cybersecurity Strategy
  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.