Cybercriminals today create and use botnets to perpetrate their criminal activities. Whether it is to send out Blackhole Exploit Kit spam or to use as entry points into organizations, the one constant is that most bots (victim computers) communicate back and forth with command and control (C&C) servers. Trend Micro’s Global Threat Intelligence, derived from…
Read MoreJon Clay
Global Threat Communications
- “The threats today are unique for each victim and move from endpoint to data center, and as such organizations need to shift the paradigm of multiple vendors to a single, connected threat defense model to improve detection and visibility across their network.” Experience: 20+ years in cybersecurity, 30+ in technology Specialty: Cyber threat landscape and advanced detection technologies Education: BS, Electrical Engineering w/ emphasis on Computer Engineering, Michigan State University About: Jon Clay is responsible for managing marketing messages and external publication of all the threat research and intelligence within Trend Micro as well different core technologies. As an accomplished public speaker with hundreds of speaking sessions around the globe, Jon focuses on the threat landscape and the use of big data in protecting against today’s sophisticated threats. Jon has held roles within Trend Micro as a Sales Engineer, Sales Engineering Manager, Training Manager and Product Marketing Manager for SMB prior to taking over as Director of Global Threat Communications. Jon is also a volunteer speaker for the Trend Micro Internet Safety for Kids and Families program. This experience has given him a broad technical background and understanding of the security requirements of businesses as well as an excellent understanding of the threat landscape. In his spare time he enjoys fly fishing & fly tying, golf, tennis, and spending time with his family. Expert in Action See Jon’s Monthly Threat Webinar series and his weekly roundup blog. Chat with Jon on Twitter (@jonlclay)
If there’s one thing I’ve learned about the threat landscape today, it’s this: it’s always growing, and it’s always changing. Both mobile computing and the cloud are changing the threat landscape, while old threats like malware and spam continue to grow and proliferate. Every day, we receive 430,000 files for analysis, of which 200,000 are…
Read More