• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   CTO Insights

CTO Insights: The General Data Protection Regulation (GDPR) Is Coming, What Now?

  • Posted on:January 12, 2017 at 12:00 am
  • Posted in:CTO Insights
  • Author:Raimund Genes (Chief Technology Officer)
0

Based on the incidents we saw in 2016, I recommend that organizations enter 2017 with caution. From the growth of Business Email Compromise (BEC) attacks to cybercriminals using more effective ways to exploit Internet of Things (IoT) devices, these security issues should serve as a reminder for businesses and individuals to be more vigilant. One of the most pressing matters that a lot of organizations need to pay attention to, however, is the forthcoming General Data Protection Regulation (GDPR). The new set of rules is designed to harmonize data protection across all EU member states and bring in a number of key components that will directly impact businesses—even businesses outside Europe.

Read More
Tags: GDPRGeneral Data Protection Regulation

LinkedIn Breach: More Questions than Answers

  • Posted on:May 20, 2016 at 12:10 am
  • Posted in:CTO Insights, Social, Targeted Attacks
  • Author:Raimund Genes (Chief Technology Officer)
0

Earlier this week, it was reported that the 2012 breach of LinkedIn was far worse than originally thought: instead of the 6.5 million stolen records that were reported at the time, it turned out that 167 million users were affected. 117 million of these records contained the user’s email address and password.

It wasn’t until this bigger breach was sold in dark web communities that everyone became aware of this bigger problem. LinkedIn issued a blog post that confirmed the leaked data was authentic and asked affected users to reset their passwords.

Read More
Tags: CTO Insightsdata breachLinkedIn

CTO Insights : Will 2016 Be a Better Year for Cyber Security?

  • Posted on:February 4, 2016 at 1:31 am
  • Posted in:CTO Insights, Internet of Things
  • Author:Raimund Genes (Chief Technology Officer)
0

2015 was a big challenge for cyber security. There were a lot of fireworks with all the high profile targets and attackers that made headlines. But now we can ask, will 2016 be a better year for cyber security? What are we – both end users and the security industry – going to do to make 2016 a better year?

Read More
Tags: 2016 pred2016 predictionsIOTransomware

Targeted Attacks: Not All Attacks Need To Be Sophisticated

  • Posted on:August 27, 2015 at 8:05 pm
  • Posted in:CTO Insights, Targeted Attacks
  • Author:Raimund Genes (Chief Technology Officer)
0

The security industry loves to talk about how “sophisticated” attacks can be. Usually this takes the form of us saying how advanced and sophisticated an attack is, what new methods were used to hide servers or make analysis harder, etcetera. However, it’s easy to forget that not all attacks need to be technically sophisticated; instead…

Read More

Defending Critical Systems: Does It Have To Be “Smart”?

  • Posted on:July 3, 2015 at 4:54 am
  • Posted in:CTO Insights
  • Author:Raimund Genes (Chief Technology Officer)
0

Everywhere I go it seems to be that “critical” systems are being attacked. Earlier this year people were talking about whether planes could be hacked. We’ve talked about whether smart grids can be hacked, too. Just a week or so ago, LOT Polish Airlines was almost completely grounded by a distributed denial-of-service (DDoS) attack. In…

Read More
Page 1 of 612 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.