Top IT Security Bloggers

Trend Micro - Cloud Security Blog
  • Innovate or Die?

    Trend Micro - Cloud Security Blog
    The recent series of IT acquisitions and IPOs highlight a simple economic fact: companies that fail to keep up with the fast-paced innovation of technology can easily become targets for acquisition. Mark Twain put it this way: History doesn’t repeat itself, but it rhymes. As a former Gartner analyst, I find it irresistible to comment...
    The post Innovate or Die? appeared first on .
  • This Week in Security News: Phishing Campaigns and a Biometric Data Breach

    Trend Micro - Cloud Security Blog
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about ever-increasing amounts of phishing campaigns and how Trend Micro caught 2.4 million attacks of this type — a 59% increase from 1.5 million in the...
    The post This Week in Security News: Phishing Campaigns and a Biometric Data Breach appeared first on .
  • Customer Perspective: Catching the thief lurking in the shadows with EDR and MDR

    Trend Micro - Cloud Security Blog
    A guest blog by Ian Loe, Senior Vice President, Cybersecurity, NTUC Enterprise Co-operative Limited News flash: aided by time, persistence and smarts, advanced cybersecurity felons are leapfrogging traditional security systems to compromise confidential data. Realising this, we at NTUC Enterprise have been looking into new security technologies that help address these rising concerns. One of...
    The post Customer Perspective: Catching the thief lurking in the shadows with EDR and MDR appeared first on .
  • Cyberattack Lateral Movement Explained

    Trend Micro - Cloud Security Blog
    [Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement. And the reason why I want to tackle this today is because I’ve had some conversations in the last few days that have really kind of hit that...
    The post Cyberattack Lateral Movement Explained appeared first on .
  • This Week in Security News: Ransomware Campaigns and Cryptocurrency Miners

    Trend Micro - Cloud Security Blog
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about continuing cybersecurity attacks targeting small governments. Also, read how XDR, Trend Micro’s newest solution, is more comprehensive than EDR and helps better meets the security...
    The post This Week in Security News: Ransomware Campaigns and Cryptocurrency Miners appeared first on .
  • This Week in Security News: Ransomware Campaigns and Cryptocurrency Miners

    Trend Micro - Cloud Security Blog
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about continuing cybersecurity attacks targeting small governments. Also, read how XDR, Trend Micro’s newest solution, is more comprehensive than EDR and helps better meets the security...
    The post This Week in Security News: Ransomware Campaigns and Cryptocurrency Miners appeared first on .
  • Why XDR Is A Big Deal, and Is Different from SIEM and Platforms

    Trend Micro - Cloud Security Blog
    In Jon Clay’s post, he does a great job of explaining the evolution from EDR to XDR. In short, he explained that Endpoint Detection and Response (EDR) is great, but that having sources of information beyond endpoint is better. The ‘X’ in XDR is essentially ‘many’ or whatever we can add to provide a broader,...
    The post Why XDR Is A Big Deal, and Is Different from SIEM and Platforms appeared first on .
  • XDR Needs Network Data and Here’s Why

    Trend Micro - Cloud Security Blog
    As we’ve discussed in previous blogs, XDR is a better way to detect attacks within a network since it is able to coordinate and collaborate threat intelligence and data across multiple threat vectors, including endpoint (including mobile and IIoT), server, network, messaging, web, and cloud. In this blog I want to discuss an area of...
    The post XDR Needs Network Data and Here’s Why appeared first on .
  • Digital skimmers: What are they and how can I keep my card details safe online?

    Trend Micro - Cloud Security Blog
    A few weeks ago, British Airways was hit by the largest ever regulatory fine of its kind, after global customers visiting its website had their card data stolen. The $228m penalty levied by the UK’s privacy watchdog reflects the seriousness of the attack and the carrier’s failure to protect its customer’s personal and financial information....
    The post Digital skimmers: What are they and how can I keep my card details safe online? appeared first on .
  • This Week in Security News: Ransomware Campaigns and Cryptocurrency Miners

    Trend Micro - Cloud Security Blog
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about three different ransomware campaigns that caused havoc in different public sectors. Also, read how threat actors are infecting vulnerable Linux servers with a cryptocurrency miner....
    The post This Week in Security News: Ransomware Campaigns and Cryptocurrency Miners appeared first on .

Editor's Recommendations

Brand Page

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release