• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Internet of Things

The Risk of IoT Security Complacency

  • Posted on:September 5, 2018
  • Posted in:Internet of Things, Security
  • Posted by:
    William "Bill" Malik (CISA VP Infrastructure Strategies)
0
Cyber security professionals are increasingly relying on their key security solutions to bridge staff and knowledge gaps.

Trend Micro recently surveyed 1,150 IT executives globally. We found a gap between the perceived risk from IoT and the planned mitigation for that risk. Most senior executives recognize that IoT can introduce security risk to the organization, but few will invest resources to remediate that risk. Click here for more details. Senior leadership should…

Read More
Tags: ICT securityinformation security gap analysisIoT risk assessmentIoT security

Securing the Convergence of IT with OT

  • Posted on:September 4, 2018
  • Posted in:Business, Internet of Things, Security
  • Posted by:
    William "Bill" Malik (CISA VP Infrastructure Strategies)
0

The Industrial Internet of Things (IIoT) is the leading edge of the convergence of Operational Technology (OT) with IT. This convergence begins with network connectivity but requires enhancements in operational procedures, technology, and training as well. Beginning with the network, IT and OT use different protocols. Within the OT world, vendors have created many proprietary…

Read More
Tags: devopsIndustrial Internet of ThingsOperational Technology

Back to Basics: Why We Need to Encourage More Secure IoT Development

  • Posted on:August 22, 2018
  • Posted in:Internet of Things, Security
  • Posted by:
    Mike Gibson
0

The Internet of Things (IoT) is radically reshaping the way we live and work. Before our very eyes, organizations are becoming more agile, efficient and cost effective to run, all while consumers marvel at the wonders of the smart home, fitness trackers and connected cars. There’s just one major problem: Much of this new infrastructure…

Read More
Tags: bug bountyDDoSInternet of Things (IoT)Zero Day Initiative

Carrier Grade Security Means … Using Carrier Grade Security

  • Posted on:August 15, 2018
  • Posted in:5G, Business, Internet of Things, Security
  • Posted by:
    Greg Young (Vice President for Cybersecurity)
0

It’s a common mistake in enterprises to copy-paste security solutions from a peer. Strategies can be recycled, but sadly with even very similar businesses almost always have radically different IT and security requirements. I recall one hospital that looked at a nearly identical peer hospital that was only a few miles away. Much of the…

Read More
Tags: 5GhypervisorIoTNetwork function virtualization (NFV)

Our Extensive Survey on IoT Cybersecurity Has Remarkable Top Consequence

  • Posted on:July 26, 2018
  • Posted in:Internet of Things, Security
  • Posted by:
    Greg Young (Vice President for Cybersecurity)
0

Trend Micro recently conducted a global survey of IT and security decision makers. When asked about the top consequence to IoT security, many would have expected it to be data loss. However, the top consequence named with 52% of respondents was ā€œLoss of Customer Trust.ā€ IoT has a physical component that is unusual in the…

Read More
Tags: IoT

Preparing for Shadow OT: A Hospital Case Study

  • Posted on:July 25, 2018
  • Posted in:Business, Healthcare, Internet of Things, Security
  • Posted by:
    William "Bill" Malik (CISA VP Infrastructure Strategies)
0

The convergence of IT and OT is happening more rapidly than IT expects. Once upon a time, IT was so expensive that enterprises built entire departments to prioritize spending and efficiently manage those costly investments. Now, IT is so inexpensive that any individual who wants IT can buy it (or rent it). This is ā€œShadow…

Read More
Tags: IoTShadow OT

Securing the Connected Industrial World with Trend Micro

  • Posted on:May 3, 2018
  • Posted in:Business, Internet of Things, Security
  • Posted by:
    Eva Chen
0

At Trend Micro we’ve made it our business over the past 30 years to anticipate where technology is taking the world. That’s why our message has evolved over that time from Peace of Mind Computing to Your Internet Firewall and most recently Securing Your Journey to the Cloud. Well, we know that things are evolving…

Read More
Tags: connected worldendpointsHannover MesseIIoTIoT

The Risks of Bio-IoT

  • Posted on:April 25, 2018
  • Posted in:Healthcare, Internet of Things, Security
  • Posted by:
    William "Bill" Malik (CISA VP Infrastructure Strategies)
0
The typical enterprise has more than 500 applications in place.

Bio-IoT: Internet of Things applied to biological systems, such as pharmaceutical delivery systems, implanted medical devices, intelligent prosthetics, surgical assistants, and remote patient monitoring. IoT 2.0, with ample processing resources and OSI-conformant networking, promises vast improvements in health care. A recent paper from the IEEE describes a bright future for medical IoT (The Internet of…

Read More
Tags: BioIotICSindustrial control systemsInternet of Things

Tech Support for the Internet of Things

  • Posted on:April 3, 2018
  • Posted in:Consumer, Internet of Things
  • Posted by:
    Brook Stein, Product Management Director
0
It's critical to hire a CISO that has experience and can lead a team.

From your home PC to your smart TV, digital technologies play an increasingly important role in the American household. Yet, as we fill our lives with more and more of these connected devices, the ā€œInternet of Thingsā€ (IoT) gets more complex, which can lead to performance issues or gaps for hackers to exploit, greatly impacting…

Read More
Tags: 24-hour tech support24x7 tech supportcomputer assistancecomputer expertscomputer fixcomputer helpcomputer repaircomputer running slowcomputer support techniciandevice configuredevice set uphelp with my computerhome tech supportmalware removalmaximum securitynetworkonline tech supportpc repairpc supportpc tune upspeed up my computerspyware removaltech supportvirus removal

Trend Micro at MWC: Securing Our Mobile, Connected World

  • Posted on:March 1, 2018
  • Posted in:Consumer, Internet of Things, Mobile Security, Security
  • Posted by:
    Trend Micro
0

Time flies pretty fast in tech. When Trend Micro was founded nearly 30 years ago, mobile phones were pretty clunky, prohibitively expensive and not in the least bit ā€œsmart.ā€ Fast forward to today and the device in your pocket has more compute power than the NASA machines that put man on the moon. Over the…

Read More
Tags: Internet of ThingsMirai botnetMobile World Congress (MWC)
Page 2 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRNĀ® Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Nuffield Health Depends on Managed XDR with Trend Micro Vision One
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.