• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Uncategorized

Join our Public Preview of Cloud App Encryption for Office 365 V2.0

  • Posted on:February 10, 2015
  • Posted in:Partners, Security, Uncategorized
  • Posted by:
    Yi Zhou
1

Trend Micro Cloud App Encryption is a new service that addresses customer data privacy and sovereignty problems when moving to the Office 365 cloud. The initial North American release rolled out in October 2014 and received positive feedback from customers and partners. Cloud App Encryption 2.0 introduces on-premises key management that supports both a Trend…

Read More

Web browsers remain gateways for malware

  • Posted on:February 4, 2015
  • Posted in:Industry News, Mobility, Uncategorized, Vulnerabilities & Exploits
  • Posted by:
    Noah Gamer
0

On the cyber security front, browsers are still front and center concerns for enterprise CIOs and their teams as well as end users.

Read More

Advanced Threat Protection: Making Your Business Case

  • Posted on:December 17, 2014
  • Posted in:Security, Uncategorized
  • Posted by:
    Bob Corson
0

We all know the attention data breaches are generating. Yet what appears to be lacking in the dialogue about targeted attacks and advanced threats are the impacts that can result, and therefore, how to frame a business case. As an example, according to a recent study published by PWC, the average cost of a data…

Read More

Modern Day Dillinger Gangs

  • Posted on:October 27, 2014
  • Posted in:Security, Uncategorized
  • Posted by:Tom Kellermann
0

John Dillinger became infamous in the depression era for robbing two dozen banks. He and his gang were effective due to three tactics: they cased the institution and understood their security posture and programs; they utilized superior firepower; and they drove faster vehicles so they could escape across state lines. The modern Dillinger gangs reside…

Read More

Trend Micro and SanDisk: Storing and Securing Your Digital Life

  • Posted on:August 19, 2014
  • Posted in:Internet Safety, Security, Uncategorized
  • Posted by:
    Marcia Sequeira
0

As the largest pure-play security software vendor in the world, Trend Micro has for the past 26 years been protecting users across the globe from everything the bad guys can throw at us. Yet in recent times, as our digital lives have widened and deepened, so has our potential exposure to information-stealing malware, privacy issues,…

Read More
Page 3 of 3123

Security Intelligence Blog

  • Waterbear is Back, Uses API Hooking to Evade Security Product Detection
  • December Patch Tuesday: Vulnerabilities in Windows components, RDP, and PowerPoint Get Fixes
  • Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Answering IoT Security Questions for CISOs
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • How To Be An Informed Skeptic About Security Predictions
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Trend Micro Selected as Launch Partner for AWS Ingress Routing Service and Stalkerware on the Rise
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • The Shared Responsibility Model
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • What Worries CISOs Most In 2019

Follow Us

Trend Micro In The News

  • Trend Micro Takes On Palo Alto Networks With Cloud Conformity Buy
  • Trend Micro Partners with Snyk to Fix Vulnerabilities for DevOps
  • Trend Micro Partners With Snyk To Advance DevSecOps
  • Hackers to stress-test Facebook Portal at hacking contest
  • NEW TECH: Trend Micro inserts 'X' factor into 'EDR' - endpoint detection response
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.