• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Encryption

Are passwords going away?

  • Posted on:May 10, 2014
  • Posted in:Current News, Cybercrime, Encryption, Industry News, Internet Safety, Vulnerabilities & Exploits, Web Threats
  • Posted by:
    Trend Micro
0

The password’s demise has been predicted for years, with new modes of authentication from biometrics to wearable devices being touted as the next big things in login security. Are passwords really going away?

Read More

How much damage did Heartbleed do?

  • Posted on:May 7, 2014
  • Posted in:Current News, Cybercrime, Data Privacy, Encryption, Industry News, Internet Protection, Internet Safety, Mobility, Privacy, Privacy & Policy, Vulnerabilities & Exploits, Web Threats
  • Posted by:
    Trend Micro
0

The Heartbleed vulnerability in the OpenSSL cryptographic library has dominated cybersecurity news in recent weeks, eclipsing even the much hyped retirement of Microsoft Windows XP – but how much damage did it do?

Read More

Recent technical issues make case for encryption by default among cloud providers

  • Posted on:February 21, 2014
  • Posted in:Cloud Computing, Encryption
  • Posted by:
    Trend Micro
0

Encryption isn’t even implemented across the Web, and cloud storage services are some of the most significant soft spots.

Read More

Should all websites use HTTPS Encryption?

  • Posted on:January 28, 2014
  • Posted in:Encryption
  • Posted by:
    Trend Micro
0

While organizations in sectors such as e-commerce have been diligent about defaulting to HTTPS and maintaining up-to-date SSL certificates, numerous Global 2000 companies have come up short when it comes to ensuring secure, encrypted transmission of user data.

Read More

Record breach highlights lack of encryption in healthcare industry

  • Posted on:October 1, 2013
  • Posted in:Encryption, Industry News
  • Posted by:
    Trend Micro
0

For the highly regulated healthcare industry, encryption of protected data and basic assets, such as laptop drives, is at once a cornerstone of its compliance obligations and a measure that many individual providers have, unbelievably, not taken yet.

Read More

PRISM revelations spark renewed debate over privacy, legal protections

  • Posted on:August 20, 2013
  • Posted in:Compliance & Regulations, Current News, Encryption, Privacy & Policy, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

Following the leak of a classified slide deck by an NSA contractor this past June, the agency’s previously secretive PRISM program entered the public spotlight and inspired vigorous debate over its legality and overall implications for individual privacy.

Read More
Tags: Compliance & RegulationsCurrent NewsEncryptionPolicyPrivacy & PolicyVulnerabilities

Police force sees sanctions for unencrypted data loss

  • Posted on:October 22, 2012
  • Posted in:Encryption
  • Posted by:
    Trend Micro
0

A British law enforcement agency was fined more than $190,000 following the theft of an unencrypted USB drive that contained sensitive information regarding criminal investigations.

Read More
Tags: Encryption

Strategy needed to keep mobile secure

  • Posted on:October 11, 2012
  • Posted in:Encryption, Mobility
  • Posted by:
    Trend Micro
0

Endpoint security is something that every company needs to watch out for, especially with the number of employee devices seemingly multiplying by the day, as it seems that there are still plenty of breaches being reported each day.

Read More
Tags: EncryptionMobility

Device and data protection tips for travelers

  • Posted on:October 10, 2012
  • Posted in:Encryption
  • Posted by:
    Trend Micro
0

Travelling means seeking out new experiences, but it also can invite new risks.

Read More
Tags: Encryption

Majority of consumers raising risk with recycled passwords

  • Posted on:October 3, 2012
  • Posted in:Encryption
  • Posted by:
    Trend Micro
0

Using a complex password may not be enough to protect consumers if they insist on using the same combination to cover too many accounts.

Read More
Tags: Encryption
Page 2 of 3123

Security Intelligence Blog

  • (Almost) Hollow and Innocent: Monero Miner Remains Undetected via Process Hollowing
  • Waterbear is Back, Uses API Hooking to Evade Security Product Detection
  • December Patch Tuesday: Vulnerabilities in Windows components, RDP, and PowerPoint Get Fixes

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Answering IoT Security Questions for CISOs
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • How To Be An Informed Skeptic About Security Predictions
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Trend Micro Selected as Launch Partner for AWS Ingress Routing Service and Stalkerware on the Rise
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • The Shared Responsibility Model
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • What Worries CISOs Most In 2019

Follow Us

Trend Micro In The News

  • Trend Micro Takes On Palo Alto Networks With Cloud Conformity Buy
  • Trend Micro Partners with Snyk to Fix Vulnerabilities for DevOps
  • Trend Micro Partners With Snyk To Advance DevSecOps
  • Hackers to stress-test Facebook Portal at hacking contest
  • NEW TECH: Trend Micro inserts 'X' factor into 'EDR' - endpoint detection response
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.