• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Internet of Things

Securing IoT Networks

  • Posted on:February 22, 2018
  • Posted in:Internet of Things, Security
  • Posted by:
    William "Bill" Malik (CISA VP Infrastructure Strategies)
0
The typical enterprise has more than 500 applications in place.

Q: How do you segment a mesh? A: You can’t. Legacy IoT devices, Industrial Control Systems with custom networking, are exceptionally difficult to secure. Typically, these devices contain only enough compute capabilities to support their primary operational function. They have limited memory, low power, constrained CPU resources, and very little network bandwidth. They do not…

Read More
Tags: industrial control systemsSecuring IoT Networks

Securing Our Connected Car Future with Panasonic

  • Posted on:February 21, 2018
  • Posted in:Internet of Things, Security
  • Posted by:
    Trend Micro
0

There are few more exciting frontiers of the Internet of Things (IoT) than connected cars. Gartner predicts that there will be 61 million vehicles with built-in connectivity on our roads by 2020. But as we drive ever closer to a future where autonomous vehicles are a commonplace sight, we must be alert to the implications…

Read More
Tags: GartnerInternet of Things (IoT)PanasonicPanasonic’s Control Area Network (CAN)

Securing Our Connected Car Future with Panasonic

  • Posted on:February 20, 2018
  • Posted in:Business, Internet of Things, Security
  • Posted by:
    Trend Micro
0

There are few more exciting frontiers of the Internet of Things (IoT) than connected cars. Gartner predicts that there will be 61 million vehicles with built-in connectivity on our roads by 2020. But as we drive ever closer to a future where autonomous vehicles are a commonplace sight, we must be alert to the implications…

Read More
Tags: electronic control units (ECUs)infotainmentIoTPanasonic

Data Privacy in the Age of IoT

  • Posted on:February 1, 2018
  • Posted in:Consumer, Data Privacy, Internet of Things, Security
  • Posted by:
    Trend Micro
0

On Data Privacy Day, January 28th, we should have all taken a few moments to think more carefully about safeguarding our personal data, staying safe online, and improving our privacy habits. Just what does that mean in the age of IoT — the Internet of Things? In previous years, cyber threats mostly consisted of ransomware,…

Read More
Tags: Business Email CompromiseData Privacy DayIoT

Securing the Three Families of IoT

  • Posted on:January 11, 2018
  • Posted in:Internet of Things, Security
  • Posted by:
    William "Bill" Malik (CISA VP Infrastructure Strategies)
0

Securing the Internet of Things is difficult. One reason is the Internet of things consists of three different groups of technology. Each group has radically different architectural constraints. Securing each group requires a distinct approach. IoT 0.9Ā  The primitive group contains all legacy Operational Technology (OT) and Industrial Control Systems (ICS) that use some form…

Read More
Tags: CensysInternet of ThingsShodan

Security Round-up: Five Things We’ve Learned in 2017

  • Posted on:December 27, 2017
  • Posted in:Business, Compliance & Regulations, Consumer, Internet of Things, Security
  • Posted by:
    Trend Micro
0

The past 12 months have been packed with geopolitical incidents, global malware threats and ubiquitous big-name data breaches. From the CIA Vault7 and NSA Shadow Brokers leaks at the start of the year, to the WannaCry and NotPetya ā€˜ransomware’ campaigns, and Uber’s shocking revelations just last month, there’s been plenty for UK CISOs to ruminate…

Read More

Improving Vehicle Security

  • Posted on:November 30, 2017
  • Posted in:Internet of Things, Internet Protection, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0

We have been investing in IoT Security for many years now, both in researching many of the challenges we’re seeing within IoT infrastructure and device security, to developing solutions that protect against threats targeting IoT and IIoT devices. Today we announced an alliance with Mentor that looks to improve the security of connected vehicles by…

Read More
Page 3 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.