• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research

Cleaner One Pro Speeds Up Your Mac: Part 1

  • Posted on:July 9, 2020
  • Posted in:Consumer
  • Posted by:
    Trend Micro
0
Mac users have to be wary of malware.

The Mac has always been pretty easy to use, but even the most ardent Mac supporters know there comes a time when their Mac is no longer new and they notice slowdowns in its performance, particularly after intensive use. They’d like a handy one-stop tool to help them optimize memory and CPU performance, free up…

Read More
Tags: Clean Up Your MacFree Up Space on MacHow to Make Your Mac FasterMac CleanerSpeed Up Mac

Cloud Security Is Simple, Absolutely Simple.

  • Posted on:July 8, 2020
  • Posted in:Cloud Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

“Cloud security is simple, absolutely simple. Stop over complicating it.” This is how I kicked off a presentation I gave at the CyberRisk Alliance, Cloud Security Summit on Apr 17 of this year. And I truly believe that cloud security is simple, but that does not mean easy. You need the right strategy. As I…

Read More
Tags: AWSazurecloud computingCloud SecurityGoogle Cloud

Beyond the Endpoint: Why Organizations are Choosing XDR for Holistic Detection and Response

  • Posted on:July 6, 2020
  • Posted in:Cloud, Endpoint, XDR
  • Posted by:
    Trend Micro
0

The endpoint has long been a major focal point for attackers targeting enterprise IT environments. Yet increasingly, security bosses are being forced to protect data across the organization, whether it’s in the cloud, on IoT devices, in email, or on-premises servers. Attackers may jump from one environment to the next in multi-stage attacks and even…

Read More
Tags: Cloud Securityend pointendpoint detection and responseXDR

ISO/SAE 21434: It’s time to put the brakes on connected car cyber-threats

  • Posted on:July 6, 2020
  • Posted in:Current News, Internet of Things
  • Posted by:
    William "Bill" Malik (CISA VP Infrastructure Strategies)
0

Connected cars are on the move. Globally their number is set to grow 270% between 2018 and 2022 to reach an estimated 125 million in a couple of years. Increasingly, these vehicles are more akin to high-performance mobile computers with wheels than traditional cars, with features including internet access, app-based remote monitoring and management, advanced…

Read More

This Week in Security News: Payment Card Skimmer Attacks Hit 8 Cities and Survey Finds 72% of Remote Workers Have Gained Cybersecurity Awareness During Lockdown

  • Posted on:July 3, 2020
  • Posted in:Current News, Security
  • Posted by:
    Jon Clay (Global Threat Communications)
0
week in security

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, read about eight U.S. cities that recently had payment card data stolen via point-of-sale skimming malware on their Click2Gov online payment platforms. Also, learn about the cybersecurity…

Read More

Survey: Employee Security Training is Essential to Remote Working Success

  • Posted on:July 1, 2020
  • Posted in:Cloud Security, Current News, Security
  • Posted by:
    Trend Micro
0

Organisations have been forced to adapt rapidly over the past few months as government lockdowns kept most workers to their homes. For many, the changes they’ve made may even become permanent as more distributed working becomes the norm. This has major implications for cybersecurity. Employees are often described as the weakest link in the corporate…

Read More
Tags: Head in the Cloudssurvey

Are You Promoting Security Fluency in your Organization?

  • Posted on:June 30, 2020
  • Posted in:Cloud, Cloud Computing, Cloud Security, misconfiguration
  • Posted by:
    Trend Micro
0

  Migrating to the cloud is hard. The PowerPoint deck and pretty architectures are drawn up quickly but the work required to make the move will take months and possibly years.   The early stages require significant effort by teams to learn new technologies (the cloud services themselves) and new ways of the working (the…

Read More
Tags: Cloud Securitymisconfiguration

Connected Car Standards – Thank Goodness!

  • Posted on:June 30, 2020
  • Posted in:Internet of Everything, Internet of Things, Mobility, Security
  • Posted by:
    William "Bill" Malik (CISA VP Infrastructure Strategies)
0

Intelligent transportation systems (ITS) require harmonization among manufacturers to have any chance of succeeding in the real world. No large-scale car manufacturer, multimodal shipper, or MaaS (Mobility as a Service) provider will risk investing in a single-vendor solution. Successful ITS require interoperable components, especially for managing cybersecurity issues. See https://www.trendmicro.com/vinfo/us/security/news/intelligent-transportation-systems for a set of reports…

Read More
Tags: Connected CarConnected Car SecurityISO StandardSmart Car Security

Risk Decisions in an Imperfect World

  • Posted on:June 30, 2020
  • Posted in:DevOps, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

Risk decisions are the foundation of information security. Sadly, they are also one of the most often misunderstood parts of information security. This is bad enough on its own but can sink any effort at education as an organization moves towards a DevOps philosophy. To properly evaluate the risk of an event, two components are…

Read More
Tags: Cloud SecurityPrivacysecurityVulnerabilities

Perspectives Summary – What You Said

  • Posted on:June 26, 2020
  • Posted in:Cloud, Cloud Security, Current News, Executive Insight
  • Posted by:
    William "Bill" Malik (CISA VP Infrastructure Strategies)
0

  On Thursday, June 25, Trend Micro hosted our Perspectives 2-hour virtual event. As the session progressed, we asked our attendees, composed of +5000 global registrants, two key questions. This blog analyzes those answers.   First, what is your current strategy for securing the cloud? Rely completely on native cloud platform security capabilities (AWS, Azure,…

Read More
Tags: Cloud Security
Page 3 of 240 « ‹ 234 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRN® Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Nuffield Health Depends on Managed XDR with Trend Micro Vision One
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.