• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Compliance & Regulations

Target breach shows need to create more secure payment systems.

  • Posted on:January 4, 2014
  • Posted in:Compliance & Regulations, Cybercrime
  • Posted by:
    Trend Micro
0

An attack on the point-of-sale systems at retail giant Target over the holidays may have exposed sensitive data, including PINs, from tens of millions of payment cards.

Read More

How much of a skimming risk is the Coin smart payment card?

  • Posted on:January 2, 2014
  • Posted in:Compliance & Regulations, Current News
  • Posted by:
    Trend Micro
0

Technological alternatives to cash and credit have entered the spotlight in 2013, promising convenience but often delivering security issues.

Read More

Assessing the security red flags on healthcare.gov

  • Posted on:October 21, 2013
  • Posted in:Compliance & Regulations, Industry News
  • Posted by:
    Trend Micro
0

Amid the long enrollee waiting times and the simultaneous fervor created by the federal government shutdown and standoff over the statutory debt ceiling, U.S. government observers and consumers alike may have overlooked the security red flags on healthcare.gov.

Read More

PRISM revelations spark renewed debate over privacy, legal protections

  • Posted on:August 20, 2013
  • Posted in:Compliance & Regulations, Current News, Encryption, Privacy & Policy, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

Following the leak of a classified slide deck by an NSA contractor this past June, the agency’s previously secretive PRISM program entered the public spotlight and inspired vigorous debate over its legality and overall implications for individual privacy.

Read More
Tags: Compliance & RegulationsCurrent NewsEncryptionPolicyPrivacy & PolicyVulnerabilities

Cloud customers, vendors do not see eye-to-eye on SaaS security

  • Posted on:August 8, 2013
  • Posted in:Cloud Computing, Compliance & Regulations, Current News, Privacy & Policy
  • Posted by:
    Trend Micro
0

The advent of software-as-a-service (SaaS) has changed how enterprises approach their IT operations, with many departments now regarding server infrastructure management, maintenance and vigilant security monitoring as tasks properly assigned to their cloud providers.

Read More
Tags: cloud computingCloud SecurityCompliance & RegulationsCurrent NewsPolicyPrivate Cloud

Attention to application security in BYOD boosts productivity, safety

  • Posted on:June 28, 2013
  • Posted in:Compliance & Regulations, Cybercrime, Mobility, Privacy & Policy
  • Posted by:
    Trend Micro
0

The adoption of mobile devices and a BYOD (Bring your own Device) policy likely means that organizations will see a rise in their level of productivity. A report from the Australian Mobile Telecommunications Association found that the productivity benefit of BYOD will actually reach $11.8 million Australian dollars, or just under $11 million U.S. dollars, by 2025.

Read More
Tags: Compliance & RegulationscybercrimeData PrivacyMobilityweb threats

Wall Street may need to ramp up cyber security

  • Posted on:June 21, 2013
  • Posted in:Compliance & Regulations, Current News, Cybercrime, Privacy & Policy
  • Posted by:
    Trend Micro
0

High profile attacks have been gaining steam, with The Hill’s Brian Fitch wrote on the Congress Blog that there is an emerging need for more cyber security in Wall Street.

Read More
Tags: Compliance & RegulationsCurrent NewscybercrimePrivacy & PolicyUnderground Economy

Workforce mobilization becoming the new normal in healthcare

  • Posted on:June 17, 2013
  • Posted in:Compliance & Regulations, Mobility, Privacy & Policy
  • Posted by:
    Trend Micro
0

Although security is always a concern with healthcare organizations, many are taking the route of using mobile devices as part of a BYOD (Bring your own Device) plan and worrying about securing data and devices to take advantage of the benefits these systems offer.

Read More
Tags: Compliance & RegulationsMobilityPrivacy & Policy

HR could play leading part in BYOD success

  • Posted on:June 12, 2013
  • Posted in:Cloud Computing, Compliance & Regulations, Cybercrime, Mobility, Privacy & Policy
  • Posted by:
    Trend Micro
0

It’s a trying time to be an IT director tasked with navigating a company’s move from corporate-liable devices to a BYOD (Bring your own Device) program. Ryan Faas of CITEworld said the recent CITE Conference and Expo had many professionals saying that BYOD could be considered more of a “people problem” than a strictly technical concern.

Read More
Tags: Cloud SecurityCompliance & RegulationsData PrivacyMobilityweb threats

Government agencies working toward secure procurement

  • Posted on:June 4, 2013
  • Posted in:Cloud Computing, Compliance & Regulations, Current News, Cybercrime, Privacy & Policy
  • Posted by:
    Trend Micro
0

In an effort to improve the data security of the country, the General Services Administration is now seeking input to develop improved language for cybersecurity measures taken with new procurements.

Read More
Tags: Cloud SecurityCompliance & RegulationsCurrent NewscybercrimeData PrivacyGovernment Policyweb threats
Page 2 of 5 ‹ 123 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.