Tag: Trend Micro Simply Security

Cyber Security Awareness: A Critical Checklist

Read the original article: Cyber Security Awareness: A Critical Checklist October 2020 marks the 17th year of National CyberSecurity Awareness Month, where users and organizations are encouraged to double their efforts to be aware of cybersecurity issues in all their…

1H 2020 Cyber Security Defined by Covid-19 Pandemic

Read the original article: 1H 2020 Cyber Security Defined by Covid-19 Pandemic When we published our 2020 Predictions report in December, we didn’t realize there was a global pandemic brewing that would give cybercriminals an almost daily news cycle to…

The Life Cycle of a Compromised (Cloud) Server

Read the original article: The Life Cycle of a Compromised (Cloud) Server Trend Micro Research has developed a go-to resource for all things related to cybercriminal underground hosting and infrastructure. Today we released the second in this three-part series of…

Black Hat Trip Report – Trend Micro

Read the original article: Black Hat Trip Report – Trend Micro At Black Hat USA 2020, Trend Micro presented two important talks on vulnerabilities in Industrial IoT (IIoT). The first discussed weaknesses in proprietary languages used by industrial robots, and…

This Week in Security News: Microsoft Patches 120 Vulnerabilities, Including Two Zero-Days and Trend Micro Brings DevOps Agility and Automation to Security Operations Through Integration with AWS Solutions

Read the original article: This Week in Security News: Microsoft Patches 120 Vulnerabilities, Including Two Zero-Days and Trend Micro Brings DevOps Agility and Automation to Security Operations Through Integration with AWS Solutions Welcome to our weekly roundup, where we share…

Ransomware is Still a Blight on Business

Read the original article: Ransomware is Still a Blight on Business Ransomware is Still a Blight on Business Trends come and go with alarming regularity in cybersecurity. Yet a persistent menace over the past few years has been ransomware. Now…

Cleaner One Pro Speeds Up Your Mac: Part 2

Read the original article: Cleaner One Pro Speeds Up Your Mac: Part 2 In Part 1 of this blog, we introduced Trend Micro Cleaner One Pro, a one-stop shop to help you speed up your Mac, highlighting the Quick Optimizer,…

Twitter Hacked in Bitcoin Scam

Read the original article: Twitter Hacked in Bitcoin Scam Twitter Hacked in Bitcoin Scam It started with one weird tweet. Then another. Quickly, some of the most prominent accounts on Twitter were all sending out the same message; I am…

Fixing cloud migration: What goes wrong and why?

Read the original article: Fixing cloud migration: What goes wrong and why?   The cloud space has been evolving for almost a decade. As a company we’re a major cloud user ourselves. That means we’ve built up a huge amount…

Cloud Security Is Simple, Absolutely Simple.

Read the original article: Cloud Security Is Simple, Absolutely Simple. “Cloud security is simple, absolutely simple. Stop over complicating it.” This is how I kicked off a presentation I gave at the CyberRisk Alliance, Cloud Security Summit on Apr 17…

Connected Car Standards – Thank Goodness!

Read the original article: Connected Car Standards – Thank Goodness! Intelligent transportation systems (ITS) require harmonization among manufacturers to have any chance of succeeding in the real world. No large-scale car manufacturer, multimodal shipper, or MaaS (Mobility as a Service)…

Risk Decisions in an Imperfect World

Read the original article: Risk Decisions in an Imperfect World Risk decisions are the foundation of information security. Sadly, they are also one of the most often misunderstood parts of information security. This is bad enough on its own but…

Perspectives Summary – What You Said

Read the original article: Perspectives Summary – What You Said   On Thursday, June 25, Trend Micro hosted our Perspectives 2-hour virtual event. As the session progressed, we asked our attendees, composed of +5000 global registrants, two key questions. This…

Principles of a Cloud Migration

Read the original article: Principles of a Cloud Migration Development and application teams can be the initial entry point of a cloud migration as they start looking at faster ways to accelerate value delivery. One of the main things they…

8 Cloud Myths Debunked

Read the original article: 8 Cloud Myths Debunked Many businesses have misperceptions about cloud environments, providers, and how to secure it all. We want to help you separate fact from fiction when it comes to your cloud environment. This list…

The Fear of Vendor Lock-in Leads to Cloud Failures

Read the original article: The Fear of Vendor Lock-in Leads to Cloud Failures   Vendor lock-in has been an often-quoted risk since the mid-1990’s. Fear that by investing too much with one vendor, an organization reduces their options in the…

Trend Micro Guardian: Protecting Your Kids On-the-Go

Read the original article: Trend Micro Guardian: Protecting Your Kids On-the-Go Some smart devices are not limited to use on the home network; for instance, your child’s mobile phone or tablet. Keeping your kids safe on these on-the-go devices means…

Not Just Good Security Products, But a Good Partner

Read the original article: Not Just Good Security Products, But a Good Partner The analyst firm Canalys annually produces their Cybersecurity Leadership Matrix. Whereas many third-party assessments are looking at just the security product, this one focuses on the value…

Is Cloud Computing Any Safer From Malicious Hackers?

Read the original article: Is Cloud Computing Any Safer From Malicious Hackers? Cloud computing has revolutionized the IT world, making it easier for companies to deploy infrastructure and applications and deliver their services to the public. The idea of not…

Securing Smart Manufacturing

Read the original article: Securing Smart Manufacturing “Alexa, turn on the TV.” ”Get it yourself.” This nightmare scenario could play out millions of times unless people take steps to protect their IoT devices. The situation is even worse in industrial…

Securing Smart Manufacturing

Read the original article: Securing Smart Manufacturing “Alexa, turn on the TV.” ”Get it yourself.” This nightmare scenario could play out millions of times unless people take steps to protect their IoT devices. The situation is even worse in industrial…

Teaming up with INTERPOL to combat COVID-19 threats

Read the original article: Teaming up with INTERPOL to combat COVID-19 threats If the past couple of months have taught us anything, it’s that partnerships matter in times of crisis. We’re better, stronger and more resilient when we work together.…

Teaming up with INTERPOL to combat COVID-19 threats

Read the original article: Teaming up with INTERPOL to combat COVID-19 threats If the past couple of months have taught us anything, it’s that partnerships matter in times of crisis. We’re better, stronger and more resilient when we work together.…

Trend Micro’s Top Ten MITRE Evaluation Considerations

Read the original article: Trend Micro’s Top Ten MITRE Evaluation Considerations The introduction of the MITRE ATT&CK evaluations is a welcomed addition to the third-party testing arena. The ATT&CK framework, and the evaluations in particular, have gone such a long…

Trend Micro Integrates with Amazon AppFlow

Read the original article: Trend Micro Integrates with Amazon AppFlow The acceleration of in-house development enabled by public cloud and Software-as-a-Service (SaaS) platform adoption in the last few years has given us new levels of visibility and access to data.…

“We Need COBOL Programmers!” No, You Probably Don’t

Read the original article: “We Need COBOL Programmers!” No, You Probably Don’t Editor’s note: While this topic isn’t entirely security-specific, Trend Micro leader William Malik, has career expertise on the trending topic and shared his perspective. —— There was a…

Principles of a Cloud Migration – Security, The W5H

Read the original article: Principles of a Cloud Migration – Security, The W5H Whosawhatsit?! –  WHO is responsible for this anyways? For as long as cloud providers have been in business, we’ve been discussing the Shared Responsibility Model when it…

What do serverless compute platforms mean for security?

By Kyle Klassen Product Manager – Cloud Native Application Security at Trend Micro Containers provide many great benefits to organizations – they’re lightweight, flexible, add consistency across different environments and scale easily. One of the characteristics of containers is that…

NCSA Small Business Webinar Series

Working from home? How do you keep your employees cyber-safe and cyber-secure? How do you protect your reputation, profit, and cash flow when you depend on your IT infrastructure as never before? The National Cyber Security Alliance is hosting a…

NCSA Small Business Webinar Series

Working from home? How do you keep your employees cyber-safe and cyber-secure? How do you protect your reputation, profit, and cash flow when you depend on your IT infrastructure as never before? The National Cyber Security Alliance is hosting a…