• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Policy

GDPR vs Blockchain: Technology vs the Law

  • Posted on:March 22, 2018
  • Posted in:GDPR, Policy, Security
  • Posted by:
    William "Bill" Malik (CISA VP Infrastructure Strategies)
0

One of the biggest impacts that GDPR will have for consumers (citizens of countries that comply with GDPR, at least) is the right to be forgotten. A person can request that they be removed from a record. What if the record is part of a blockchain? This poses a challenge for blockchain implementations. Blockchains are…

Read More
Tags: blockchainCompliance & RegulationsGDPR

Cybersecurity in the Workplace is Everybody’s Business

  • Posted on:October 10, 2017
  • Posted in:Business, Policy, Security
  • Posted by:
    William "Bill" Malik (CISA VP Infrastructure Strategies)
0

What can individual users do to preserve cybersecurity at work? Your organization is spending on cybersecurity tools, you have an awareness program, and if you look you will find that there are standards and procedures for choosing and maintaining products to help keep information secure. But what can an individual do? Remember – you are…

Read More

What are the Benefits of Attribution?

  • Posted on:August 16, 2017
  • Posted in:Policy, Security, Trend Spotlight
  • Posted by:
    William "Bill" Malik (CISA VP Infrastructure Strategies)
0
How should CIOs approach cyber security in the new year?

Whodunnit? The superior detective dazzles us with brilliance, skill, and patience to unmask the bad guy. The interplay of forensic science and psychological insight have fascinated us from Sherlock Holmes to the CSI television series. Sometimes the answer is completely surprising, as in Murder on the Orient Express. Other times, the mystery is known to…

Read More

Open source software development needs more support, or cybersecurity will suffer

  • Posted on:May 22, 2014
  • Posted in:Current News, Encryption, Industry News, Internet Safety, Policy
  • Posted by:
    Trend Micro
1

Open source software development is increasingly appealing to enterprises despite its risks.

Read More

Insider misuse and error are increasingly the cause of data breaches

  • Posted on:May 7, 2014
  • Posted in:Cloud Computing, Compliance & Regulations, Current News, Cybercrime, Data Privacy, Government Policy, Industry News, Internet Safety, Policy, Privacy, Privacy & Policy, Underground Economy, Web Threats
  • Posted by:
    Trend Micro
0

Data breaches have many causes, from outdated security software to employee mistakes. While organizations have to contend with a wide array of external dangers, the most serious risks may reside within.

Read More

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Digital Transformation is Growing but May Be Insecure for Many
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.