• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   security

Risk Decisions in an Imperfect World

  • Posted on:June 30, 2020
  • Posted in:DevOps, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

Risk decisions are the foundation of information security. Sadly, they are also one of the most often misunderstood parts of information security. This is bad enough on its own but can sink any effort at education as an organization moves towards a DevOps philosophy. To properly evaluate the risk of an event, two components are…

Read More
Tags: Cloud SecurityPrivacysecurityVulnerabilities

Getting ATT&CKed By A Cozy Bear And Being Really Happy About It: What MITRE Evaluations Are, and How To Read Them

  • Posted on:April 23, 2020
  • Posted in:MITRE
  • Posted by:
    Greg Young (Vice President for Cybersecurity)
0

Full disclosure: I am a security product testing nerd*.   I’ve been following the MITRE ATT&CK Framework for a while, and this week the results were released of the most recent evaluation using APT29 otherwise known as COZY BEAR. First, here’s a snapshot of the Trend eval results as I understand them (rounded down): 91.79%…

Read More
Tags: end pointMITREsecurityuser protection

Letter from the CEO: A time of kindness and compassion

  • Posted on:April 13, 2020
  • Posted in:Business, Current News, Executive Insight
  • Posted by:
    Trend Micro
0

Dear Customers, Together, we are facing a truly unprecedented situation and we have all had to adapt to the new reality. The global coronavirus pandemic is affecting our families, our communities, our organizations – indeed, it affects our perspective and way of life. As you certainly have too, at Trend Micro we have been busy…

Read More
Tags: Current Newsexecutive insightssecurity

Cloud-First but Not Cloud-Only: Why Organizations Need to Simplify Cybersecurity

  • Posted on:April 2, 2020
  • Posted in:Cloud, Cloud Security
  • Posted by:
    Wendy Moore
0

The global public cloud services market is on track to grow 17% this year, topping $266 billion. These are impressive figures, and whatever Covid-19 may do short-term to the macro-economy, they’re a sign of where the world is heading. But while many organizations may describe themselves as ā€œcloud-firstā€, they’re certainly not ā€œcloud-only.ā€ That is, hybrid…

Read More
Tags: Private CloudPublic CloudSecureCloudsecurity

Cyberattack Lateral Movement Explained

  • Posted on:August 12, 2019
  • Posted in:Cybercrime
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

[Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement. And the reason why I want to tackle this today is because I’ve had some conversations in the last few days that have really kind of hit that…

Read More
Tags: cybercrimesecurityVulnerabilitiesXDR

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 19, 2018

  • Posted on:March 23, 2018
  • Posted in:Network, Security, Zero Day Initiative
  • Posted by:
    Elisa Lippincott (Global Threat Communications)
0

Back in 2005, there were a number of us in a conference room in Austin, Texas working to determine how we would structure it, what we would name it, and how to deal with the potential backlash that would come after we announced it. What is it? I’m referring to our Zero Day Initiative. It’s…

Read More
Tags: Digital VaccinenetworksecurityVulnerabilitiesZDI

Security Glue Between the Silos of Endpoint, Server, Cloud and Network Security Gets More Critical

  • Posted on:February 8, 2018
  • Posted in:Endpoint, Security
  • Posted by:
    Greg Young (Vice President for Cybersecurity)
0

Endpoint and Host security techniques have diverged. There used to be considerable similarity between the techniques and tools used to secure desktops, servers, and even networks. Desktops evolved to become Endpoints, as mobile devices proliferated and they were assembled into a collective of being in the category of not-a-server. But as practitioners know, it isn’t…

Read More
Tags: BYODcloud-based securityMobile Securitysecurity

For all your cloud security needs…

  • Posted on:July 11, 2013
  • Posted in:Cloud
  • Posted by:
    Trend Micro
1

Over the past four years, many things have changed in our Cloud Security Blog has been online – largely because of the evolution of the industry. No longer are we encountering “cloud confusion,” as a couple of our earlier blog posts on cloud-based security and threats from the cloud discussed. The “Cloud” and security within…

Read More
Tags: cloudcloud computingCloud Securitycloud-based securitysecurity

Are you resilient to the main causes of cloud outages?

  • Posted on:June 4, 2013
  • Posted in:Cloud
  • Posted by:
    Trend Micro
0

The Cloud Security Alliance recently released a white paper on cloud computing vulnerability incidents spanning the last five years. They looked at more thanĀ 11 thousand news articles regarding cloud computing-related incidents to determine the top reasons behind outages. Did you knowĀ 64 percent of the outages can be attributed to one of three causes: Insecure Interfaces…

Read More
Tags: cloud computingCloud Securitycloud-based securitysecurity

Stolen & Lost Mobile Devices A Growing Problem

  • Posted on:May 2, 2013
  • Posted in:Security
  • Posted by:
    Richard Medugno
1

By Richard Medugno Over the past few months, I have written Fearless Web blogs about the growing problem of stolen and lost smartphones and mobile devices. It was my hope that by shedding some light on these often avoidable incidents that this nonsense would cease. And yet it hasn’t. In fact, it seems to have…

Read More
Tags: cybercrimeidentity theft preventionPassword SecurityPrivacysecuritysmartphone
Page 1 of 612 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Trend Micro Asks Students How Their Relationship to the Internet Has Changed During COVID-19
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.