Corporate Partners

Top IT Security Bloggers

Trend Micro - Cloud Security Blog
  • Sandworm and SCADA

    Trend Micro - Cloud Security Blog
    On the heels of the news that the “sandworm” vulnerability (CVE-2014-4114) was being used in attacks against the North Atlantic Treaty Organization (NATO) and several European industries and sectors, Trend Micro’s researchers Kyle Wilhoit and Jim Gogolinski and the rest of the Trend Micro FTR team have discovered new, worrying attacks utilizing this vulnerability. Our...
  • Phishing schemes: Don’t take the bait!

    Trend Micro - Cloud Security Blog
    Would you give your bank account information to a professional-looking stranger who stops you on the street? The obvious answer is no, but thousands of people do it every day—except through email and convincing banner advertisements. It’s called phishing, and it’s an identity thief’s top way to access your personal information. For example, you receive...
  • The Security of Everything

    Trend Micro - Cloud Security Blog
                  The Internet is a living thing; initially conceived upon an architecture able to withstand and rebuild following significant outages, it has taken on a life of its own, giving rise to “The Web,” to Web 2.0, globe-spanning social networks connecting and inspiring people in ways unimagined even 10...
  • Is iWorm a Wake-Up Call for Mac Security?

    Trend Micro - Cloud Security Blog
    With various publications reporting tens of thousands of users affected around the world by iWorm, does your organization have a good Mac security plan? When iWorm has infected a Mac computer, the malware makes a connection with a command and control (C & C) server out on the Internet. This connection with the C &...
  • Protecting Your Privacy – A Key to Online Security

    Trend Micro - Cloud Security Blog
    Let’s face it, folks. Maintaining your online privacy is really hard to do today. Even though it’s difficult, you should try to keep as much of your personal stuff under wraps as possible. There is a new identity fraud victim in the U.S. every three seconds.  Identity thieves don’t just look through your garbage for old...
  • Chicken or the Egg? Secure App Development

    Trend Micro - Cloud Security Blog
                    The year 2013 was labeled the “year of the breach.” I guess we were horribly wrong.  So far in 2014, we have seen nearly 600 breaches logged in the U.S. alone.  This is a global issue that needs more investment and visibility.  The recent disclosure of JP...
  • Securing Your SharePoint Deployment on Azure

    Trend Micro - Cloud Security Blog
    Moving Windows workloads, particularly SharePoint, onto Azure, is one of the most important Microsoft Cloud strategies.  More and more customers and partners have started to evaluate Microsoft Azure as their extended data center to run SharePoint services.                 SharePoint has evolved a great deal in the last decade,...
  • “Pete’s Pet Shop” Animated Videos Show the Benefits of IT Security for Small Businesses in a Colorful, Engaging Way

    Trend Micro - Cloud Security Blog
    To help educate small business owners and managers in a colorful and engaging way, Trend Micro has created a series of short, animated videos that tells the story of a fictional small business – Pete’s Pet Shop – and its pursuit of better IT security. If you have a small business, you can probably relate...
  • Situation Update: Bash Vulnerability (aka “shellshock”)

    Trend Micro - Cloud Security Blog
      It’s been over a week now since the remote code execution vulnerability affecting the bourne again shell (“bash”) was made public. Since then, we’ve seen a classic race underway between attackers seeking to exploit the vulnerability and defenders working to protect against it and deploy patches. With all the activity and updates, now is...
  • Information Security: It’s a Journey

    Trend Micro - Cloud Security Blog
    It is certainly a truism to say that an organisation’s weakest point is its own employees. It could be argued that because this has been said many times by many people, because it offers no new insight then it is of little value to state it again. Such is the nature of a truism. However,...

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place