• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Christopher Budd (Global Threat Communications)

Christopher Budd

Global Threat Communications

Christopher Budd is a global threat communications manager with Trend Micro. His focus is on communications around online security and privacy threats to help people understand in plain English the risks they face and what they can do about them. In addition, he focuses on managing crisis communications utilizing a framework and processes he helped put in place. Prior to Trend Micro, Christopher worked as an independent consultant focused on helping clients build crisis communications frameworks for online security and privacy incidents. Christopher draws on his experience as a ten-year veteran of the Microsoft Corporation, where he oversaw and managed worldwide internal and external communications around security and privacy incidents affecting Microsoft customers. During his tenure at Microsoft, he pioneered new strategies and tactics embracing new media technologies that dramatically improved the handling of communications around incidents and helped, as he likes to say, “make awful news just bad”. Christopher is a seasoned spokesperson and speaker and presenter. He has been an expert on television and radio numerous times. At Microsoft he led a live monthly security webcast for over six years. He has also given numerous presentations on communications and technology at a variety of technology and non-technology conferences. He has also given numerous presentations on communications and technology at a variety of technology and non-technology conferences. He is a columnist at Geekwire.com on security and privacy and he is a fellow of the Ponemon Institute.

Another Social Media Day, Another Twitter Hack

  • Posted on:April 23, 2013
  • Posted in:Social
  • Posted by:Christopher Budd (Global Threat Communications)
0

There’s a saying in journalism: report the news, don’t be the news. Unfortunately today the Associated Press (AP) ran afoul of that rule by having their Twitter account hijacked. In good journalistic fashion, they’re telling their own story quickly and with as much facts as possible. It sounds that they saw a phishing attack against…

Read More
Tags: associated pressBarack Obamahackingpassword managementsocial mediaTwitter

Three Lessons from the South Korea MBR Wiper Attacks

  • Posted on:April 2, 2013
  • Posted in:Targeted Attacks
  • Posted by:Christopher Budd (Global Threat Communications)
1

Last week, we posted some detailed information about the actions that the March 20, 2013 MBR wiper attacks took against systems in South Korea. Today, I’d like to take that and some additional information that has come out about the incident and draw some conclusions about what lessons this attack teaches us. When we look…

Read More
Tags: MBR wiper attackstargeted attacks

Why You Should Read the ISACA APT Study Before the Mandiant Report?

  • Posted on:February 19, 2013
  • Posted in:Targeted Attacks
  • Posted by:Christopher Budd (Global Threat Communications)
1

It’s another big information security story day at the New York Times. Three weeks ago after their big story detailing the Advanced Persistent Threats (APT) attack against their network, today they have a story detailing the ongoing espionage and corporate espionage against companies and organizations around the world. It’s a very interesting and very detailed…

Read More
Tags: APT attacksISACAmandiant report

Zombies are Funny, Until Someone Loses an Eye

  • Posted on:February 18, 2013
  • Posted in:Bad Sites
  • Posted by:Christopher Budd (Global Threat Communications)
0

Zombies (the shambling, brain-eating kind, rather than the computer kind) are all the rage these days. They’re on TV shows and video games. There are even real-life zombie walks. For whatever reason, they’re the current, fun way we like to scare ourselves. It’s not surprising when people are looking to make a little fun mischief…

Read More

Lessons from the New York Times APT Attack

  • Posted on:January 31, 2013
  • Posted in:Targeted Attacks
  • Posted by:Christopher Budd (Global Threat Communications)
0

Today is one of those days when security news finds its way to the front page of mainstream news. The New York Times announced in a very detailed report that their network had been breached starting about four months ago in an Advanced Persistent Threat (APT) attack. Their story explains that the attackers have been…

Read More
Page 1 of 212

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.