The New Email Security Technologies Powered by XGen™
Today we are excited to introduce new email security technologies powered by XGen™ and a new product, Smart Protection for Office 365. This new service combines the advantages of both an email gateway...
View ArticleEndpoint isn’t the best place to block threats
Hackers often look for a number of ways to target business users, compromise critical systems and get away with sensitive information or money. These attacks can come from email and web sources, and...
View ArticleAttack The Machines: The lucrative business of ATM malware
Trend Micro and Europol’s European Cybercrime Centre (EC3) today released a publicly available report on the ATM malware landscape. This builds on the 2016 report that was privately released to...
View ArticleHelping Mobile Operators Keep Customers Safe with Virtualized Network Security
At Trend Micro we’re always looking for innovative new ways to support our customers and help overcome their cybersecurity challenges. Mobile network operators (MNOs) are increasingly adopting...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of September...
A couple of years back, I remember working at a tradeshow booth and giving a demo to someone who was interested in our solution. He said, “Your solution is great, but I need something that will not let...
View ArticleNational Cyber Security Awareness Month for Organizations
The month of October 2017 is again the National Cyber Security Awareness Month (NCSAM) for individuals and organizations. This year’s theme is shared responsibility which is something we’ve been...
View ArticleTaking Healthcare Threat Protection to the Next Level with HITRUST
Healthcare organizations (HCOs) worldwide continue to be on the receiving end of cyber-attacks. But if we work together we have both the tools and motivation to turn this around. That’s why Trend Micro...
View ArticleWhen Phishing Starts from the Inside
A growing concern of security professionals is internal phishing attacks – phishing emails sent from one trusted user to another of the same organization. Internal phishing emails are used in...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of October 2, 2017
Have you ever read something online and you read a word as something else? Sometimes the weight of our eyelids makes our eyes deceive us after hours staring at a computer screen. As I stated to read a...
View ArticleBargains and brotherhood: The underground Digital Souks of the Middle East
The release of our report “Digital Souks: A glimpse into the Middle Eastern and North African underground” marks the 12th in our Cybercriminal Underground Economy Series (CUES). Having previously...
View ArticleCybersecurity in the Workplace is Everybody’s Business
What can individual users do to preserve cybersecurity at work? Your organization is spending on cybersecurity tools, you have an awareness program, and if you look you will find that there are...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of October 9, 2017
Even though “Patch Tuesday” isn’t supposed to exist anymore, here I am blogging about it. As I looked at the October updates from Microsoft, the usual suspects were there. But this month was a little...
View ArticleSmall Business: A Target for Cyber Criminals
The age of cyber threats has been marked with critical vulnerabilities, evolving strains and organizations that have faced the consequences. Target's breach, the rise of ransomware like WannaCry and...
View ArticleTrend Micro is Proud to Sponsor G33kW33k!
It started as a small idea. Get a bunch of good people together, away from the pressures of their offices, and see if they could address some of the issues operational security teams have to deal with....
View ArticleToday’s Predictions for Tomorrow’s Internet
Making predictions is a tricky business and in no area more so than in the area of rapidly developing technology. The pace of change continues to accelerate and the nature of innovation is such that...
View ArticleTrend Micro Top Again for Breach Detection, Says NSS Labs
In spite of a rapidly evolving landscape, data breaches remain among the most common and damaging cyber-threats facing organizations today. As digital transformation efforts take hold, so the corporate...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View Article