Amazon Macie and Deep Security
Amazon S3 stores trillions of objects and regularly peaks at millions of requests per second. By any metric, it’s massive. With unparalleled durability and availability, it’s the backbone of AWS’ data...
View ArticleWhat are the Benefits of Attribution?
Whodunnit? The superior detective dazzles us with brilliance, skill, and patience to unmask the bad guy. The interplay of forensic science and psychological insight have fascinated us from Sherlock...
View ArticleTrend Micro Identified as a Representative Vendor for its Protection...
We are proud to be included in this year’s Gartner Market Guide for Cloud Workload Protection Platforms report*, which included 24 security leaders in Cloud Workload Protection solutions. Trend Micro...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of August 14, 2017
One of my favorite movies is the 1999 comedy “Galaxy Quest,” which features the cast of a science-fiction television series similar to Star Trek. In the movie, the crew is visited by real aliens who...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleLevel up your cybersecurity journey with CLOUDSEC 2017
Beginning this month, Trend Micro will be hosting CLOUDSEC, one of the largest cybersecurity conferences across Asia-Pacific and Europe. The event features presentations and panel discussions from...
View ArticleVisit Trend Micro at VMworld 2017
Trend Micro will be at VMworld 2017 in Las Vegas on August 27th – 31st, showing why experience matters when it comes to automated security for your data center and cloud environments. Stop by our...
View ArticleMindPoint Group and Trend Micro Help Secure NASA’s Successful Journey to the...
For decades NASA has launched countless successful explorations into space, but just recently took on the mission of launching their data into the cloud, similarly to many other organizations today....
View ArticleRansomware is Here to Stay: So How Do I Protect My Data?
Ransomware is the gift that keeps on giving for cybercriminals. Google research revealed recently that online extortionists have managed to grab more than $25 million from their victims over the past...
View ArticleTargeted Attack Landscape: A Continuing Threat
When planning the cyber defenses of an organization, it's important to factor in the total threat landscape – including continuing threats as well as emerging security issues. In this way,...
View ArticleThe biggest ransomware threat could be in your pocket
WannaCry and NotPetya ransomware attacks in recent months have reignited concern over just how these threats occur. As a result, many leaders have reinvigorated their security efforts regarding...
View ArticlePhishing: A Main Concern for Enterprise Security
IT leaders have an array of considerations they must factor into company security planning, not the least of which include the most current threats. Armed with knowledge about the most pressing IT...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of August 21, 2017
In last week’s blog entry, I mentioned the fact that the Zero Day Initiative (ZDI) published two zero-day advisories (ZDI-17-691 and ZDI-17-692) for vulnerabilities found in Foxit Reader after Foxit...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View Article4 Principles For Hybrid Cloud Success
The future is cloud. At this point in it’s evolution it’s undeniable. The questions facing organizations now are “how much?” and “how fast?” How do you map out a reasonable path to a cloud deployment?...
View ArticleExtend Protection to VMWare Cloud on AWS with Trend Micro™ Deep Security™
On August 28th at VMworld 2017 in Las Vegas, VMware announced initial availability for their unique offering called ‘VMware Cloud on AWS’ allowing customers to run VMware workloads on the AWS cloud....
View ArticlePetya expands its scope: A global ransomware threat
Ransomware remains a formidable threat for individual users and businesses alike, particularly as new sample families continue to be discovered by security researchers. What makes ransomware so...
View ArticleIt’s Back to School Time, So How Do I Keep My Child Safe Online?
The end of the summer can be a pretty stressful time for parents as well as their kids. Apart from the prospect of a return to school, there’s a whole checklist of items to get ready. Schoolbag? Check....
View ArticleHow hackers have improved their BEC attack methods
Email is increasingly an integral part of global life, but business email compromise (BEC) attacks could place these communications at risk. Research by The Radicati Group found that 2.9 billion...
View ArticleVMworld 2017 Recap
VMware featured a number of great announcements at VMworld 2017 including VMware Cloud on AWS. VMware customers can now run new or existing virtualized workloads in the AWS cloud while maintaining...
View Article