Coupon fraud could be costing your business millions
Customers are always looking for good deals with their purchases and a coupon could be the defining factor for a buyer completing his or her transaction. In fact, a 2015 survey by CreditCards.com...
View ArticleHow To Budget For Cyber Security in 2018
As Q4 begins in earnest, now is the time to start making considerations for next year's budgets. This is especially true for the company's IT and cyber security budgets – a difficult decision with so...
View ArticlePursuing The Right to be Left Alone
The three pillars of privacy, defined in “The Right to Privacy” (4 Harvard L.R. 193 (Dec 15, 1890)), are 1) the right to know what information is gathered about you, 2) the right to know how it will be...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of November 13,...
The dreaded white, blank screen in Microsoft Word is taunting me, with its blinking cursor asking for words to be written. Just when I thought I wouldn’t get any inspiration for this week’s blog,...
View ArticleCustomer-driven Rapid Innovation for Hybrid Cloud Security
Cyber threats have no boundaries; they come in new and evolving forms, capable of striking at any time … so it becomes important that your threat protection extends beyond conventional boundaries as...
View ArticleTrend Micro Protects VMware on Amazon Web Services
Organizations are taking advantage of changes in computing technology to position themselves for a more agile future. Technology leaders and architects see value beyond the data center with new public...
View ArticleDouble Whammy: When One Attack Masks Another Attack
In some contexts, a double whammy can mean a good thing: when your favorite team wins two games in a row, when two candy bars fall from the vending machine, etc. However, in the context of cyber...
View ArticleOptimize Your Mac!
Mac laptop and mini users often struggle to optimally use their computer’s memory or to keep their disk clean, since these Macs may be a bit tight on resources to begin with. Users can run out of...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of November 20,...
It’s that time of year again, when many will gather with their families, eat way too much, and catch those crazy Black Friday sales. I’ve been seeing “Black Friday” sales for almost two weeks now....
View ArticleUber: How Not To Handle A Breach
Uber is a company that is embattled on all fronts. From a very public power struggle to labour issues to regulatory challenges to a reportedly toxic culture, Uber sits in a precarious position....
View ArticleHow To Rock Each Day At AWS re:Invent
This week 40,000 people are going to gather in Las Vegas for the biggest event in cloud, AWS re:Invent 2017. This is a fantastic event jam packed with opportunities to meet members of the community,...
View ArticleHow can I tell if my PC is infected?
4 signs your PC might be infected with malware – by Brook Stein, Director of Product Management Years ago, computer hackers would brag about how many PCs they infected as a means of showing off their...
View ArticleIMMUNIO has been acquired by Trend Micro
– by Zaid Al Hamami co-founder of IMMUNIO Today I am thrilled to announce that IMMUNIO has been acquired by Trend Micro. Our journey started 4 years ago, when Mike Milner and I were frustrated with...
View ArticleOur Exposed World – Exposed Cities in Europe
Today Trend Micro’s FTR team released more papers on our continued investigation into our exposed world. Already having looked at the Exposed US, we now turn our attention to Europe, looking not only...
View ArticleOur Exposed World – How Exposures Translate into Attacks
One of the questions I am asked often is why am I not more concerned about sophisticated attacks? Why do I not deeply investigate new exploits as they are released? To which I reply “because the old...
View ArticleHoliday Shopping Scams: ‘Tis the Season for Data Protection
Now that the holiday shopping season is upon us, consumers will be on the lookout for the best deals on the hottest toys, electronics, clothing and more. While this season can bring good tidings and...
View ArticleIntegrating with Amazon GuardDuty
We’re thrilled to be continuing our long-running partnership with AWS with several new announcements designed to allow for tighter integration; more effective, automated security; and lower operational...
View ArticleImproving Vehicle Security
We have been investing in IoT Security for many years now, both in researching many of the challenges we’re seeing within IoT infrastructure and device security, to developing solutions that protect...
View Article