Top IT Security Bloggers

Trend Micro - Cloud Security Blog
  • This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws

    Trend Micro - Cloud Security Blog
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Apex One™ enters as the evolution of Trend Micro’s endpoint security solution for enterprise. Also, learn about Java Usage Tracker’s new weakness and the conditions that enabled...
    The post This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws appeared first on .
  • It’s Everyone’s Job to Ensure Online Safety at Work

    Trend Micro - Cloud Security Blog
    As part of our effort to support National Cyber Security Awareness Month I wanted to provide information on the need for everyone within a business to be aware of their role in keeping the organization safe from cyber attacks.  Let’s discuss some of the areas where we see existing organizations employees may be lacking in...
    The post It’s Everyone’s Job to Ensure Online Safety at Work appeared first on .
  • Trend Micro Redefines Endpoint Security with Apex One™

    Trend Micro - Cloud Security Blog
    Today, Trend Micro is excited to bring you Apex One™, the evolution of our endpoint security solution for enterprise. Apex One™ combines a breadth of threat detection & response capability with investigative features, in a single agent. Over the last few years, endpoint investigative features have become interesting in the marketplace, spurring the growth of...
    The post Trend Micro Redefines Endpoint Security with Apex One™ appeared first on .
  • The BEC List: Helping Thwart Business Email Compromise through Collaboration

    Trend Micro - Cloud Security Blog
    Today, the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) gave the JD Falk Award to the Business Email Compromise (BEC) List. The BEC List comprises cybersecurity firms, researchers and internet infrastructure companies that help deal with cybercriminal activities and schemes. The JD Falk Award is given to individuals or groups whose meritorious work has...
    The post The BEC List: Helping Thwart Business Email Compromise through Collaboration appeared first on .
  • The Many Paths To A Cybersecurity Education

    Trend Micro - Cloud Security Blog
    Ask a room full of cybersecurity professionals about their educational background and how they got started on their career path and you’re going to get a myriad of different answers. From one perspective, that’s frustrating. It’s hard to confidently recommend a path for people starting out when almost any path can end up at your...
    The post The Many Paths To A Cybersecurity Education appeared first on .
  • Let’s Continue the Skills Gap Conversation

    Trend Micro - Cloud Security Blog
    Most analysis is that the cybersecurity skills gap or shortage is getting worse. ESG reported in CSOOnline that 2018 had the highest levels, at 51%, where organizations “claimed their organization had a problematic shortage of cybersecurity skills.” It’s a complex problem, but I believe with non-complex solutions.   The Problems (and the Solutions) HR &...
    The post Let’s Continue the Skills Gap Conversation appeared first on .
  • Keeping Kids Safe Online Starts with Good Habits at Home

    Trend Micro - Cloud Security Blog
    During the month of October, we celebrate National Cybersecurity Awareness Month (NCSAM). This long-running annual event is all about raising awareness about the importance of protecting our information and privacy online. And for some of us who may have allowed our good habits to lapse, it offers a chance to refresh our knowledge. Although the...
    The post Keeping Kids Safe Online Starts with Good Habits at Home appeared first on .
  • Accelerating PCI Data Security Standard projects with Deep Security as a Service

    Trend Micro - Cloud Security Blog
    Does your organization need to meet PCI DSS requirements? Are you struggling with multiple security tools? Or stretching your already overstretched team to prepare for an audit? Time to hit the accelerator with Trend Micro! If your applications deal with credit or payment card data, you need to go through a long and cumbersome certification...
    The post Accelerating PCI Data Security Standard projects with Deep Security as a Service appeared first on .
  • Stop Office 365 Credential Theft with an Artificial Eye

    Trend Micro - Cloud Security Blog
    We all know that email remains by far the number one threat vector facing organizations today. Trend Micro blocked more than 20.4 billion threat in the first half of 2018 alone, nearly 83% of which were email borne. But there’s more: corporate email accounts have also become a key target for attackers in their own...
    The post Stop Office 365 Credential Theft with an Artificial Eye appeared first on .
  • Answers to Your Questions on Our Apps in the Mac App Store

    Trend Micro - Cloud Security Blog
    Reports that Trend Micro is “stealing user data” and sending them to an unidentified server in China are absolutely false. Trend Micro has completed an initial investigation of a privacy concern related to some of its MacOS consumer products. The results confirm that Dr Cleaner, Dr Cleaner Pro, Dr. Antivirus, Dr. Unarchiver, Dr. Battery, and...
    The post Answers to Your Questions on Our Apps in the Mac App Store appeared first on .

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release