• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   data protection

Which Threats had the Most Impact During the First Half of 2018?

  • Posted on:November 6, 2018
  • Posted in:Current News, Security
  • Posted by:
    Trend Micro
0

One of the best ways for organizations to shore up their data security efforts and work toward more proactive protection is by examining trends within the threat environment. Taking a look at the strategies for attack, infiltration and infection currently being utilized by hackers can point toward the types of security issues that will continue…

Read More
Tags: cryptocurrency minerCryptocurrency miningdata breachdata protectiondata securitymega breachransomwareVulnerabilities

Why are you scared of the cloud?

  • Posted on:April 15, 2013
  • Posted in:Cloud
  • Posted by:
    Ryan Delany
1

As a Product Marketing Manager for Trend Microā„¢ Worry-Freeā„¢ Business Security Services, I hear a lot of objections about the product, and in particular, a lot of cloud-related fears. Some examples of things I hear from customers and partners are: ā€œI wouldn’t be secure if my Internet connection went down.ā€ ā€œI don’t want to put…

Read More
Tags: Appleclientcloudcloud computingCloud Securitycloud storagedata protectionGoogleIT managementNetflixscared of the cloudsecure cloudsmall business cloud

Apple’s iMessage is good, but DEA access still possible

  • Posted on:April 5, 2013
  • Posted in:Mobility
  • Posted by:
    Eric Skinner
1

There’s been a little confusion and misinterpretation about CNET’s articleĀ detailing a U.S. Drug Enforcement Agency intelligence note concerning difficulties in intercepting Apple iMessage communications. The DEA didn’t say that these messages couldn’t be intercepted by the government. They said they couldn’t be intercepted using typical wiretap authorizations implemented by wireless carriers. That’s because iMessage traffic…

Read More
Tags: Appledata protectiondata securityDEAencrypted messagesgovernmentiMessageintelligence noteiOSlaw enforcementPatriot ActPrivacyrouge carrier base stationssecurityU.S. Drug Enforcement Agency

Top 10 AWS Security Tips: #8 Encrypt Sensitive Data

  • Posted on:April 3, 2013
  • Posted in:Cloud
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
1

Last week, weĀ tackled the basics of monitoring your AWS deployment. This week we’re going to shift gears and take a look at encryption. Data Drives Your Business Your business runs on data and information. One of the biggest concerns about moving to the public cloud is the safety of that data. With a little due…

Read More
Tags: AWS best practicesAWS encryptionaws securityAWS security best practicesCloud Securitydata protectiondatabase encryptiondatabase securityEncryptionfile securityhow to secure AWSMark NunnikhovenPublic Cloudsecuring AWStop AWS tips

Data Protection Should Follow the Risk

  • Posted on:March 12, 2013
  • Posted in:Mobility
  • Posted by:
    Trend Micro
1

The convergence of consumerization, BYOD, and cloud computing is a phenomenon difficult to describe in a fewĀ words. I’ve heard IT managers call it ā€œa perfect stormā€ — and there’s some truth to that. However, I just found the most accurate, blog-worthy description in a new IDC Analyst Connection. Analyst Phil Hochmuth states, ā€œAll these trends…

Read More
Tags: BYODcloud servicesconsumerizationcustomer datacustomer data securityData Privacydata protectiondata securitydropboxend userend user protectionendpoint protectionenterprise data securityGoogle DocsIDC Analyst connectionPhil Hochmuth

2013 Predictions in Cloud Security

  • Posted on:December 13, 2012
  • Posted in:Cloud
  • Posted by:Christopher Budd (Global Threat Communications)
0

What are some things that we should be watching out for around Cloud Security in 2013? This time every year, Raimund Genes, Trend Micro’s Chief Technology Officer (CTO)Ā and his colleagues hereĀ take stockĀ of what they’ve seen in the past year and what they think we can expect in the coming year. For 2013, in the area…

Read More
Tags: 2013 predictionsCloud SecurityCTOCTO insightsdata protectionfuture of securityIT AdministratorsRaimund Genessecurity predictions

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.