Top IT Security Bloggers

Trend Micro - Cloud Security Blog
  • Phishing, Part 2: Staying Safe

    Trend Micro - Cloud Security Blog
    As mentioned in Phishing Part 1: On the Lookout, phishing attacks have been around for years, but today’s cybercriminals are adept at using them in an ever-increasing variety of ways to get what they want. According to the most recent FBI figures, phishing and its variants was the third most popular cybercrime type in 2017,...
    The post Phishing, Part 2: Staying Safe appeared first on .
  • Phishing, Part 1: On the Lookout

    Trend Micro - Cloud Security Blog
    Cybersecurity has gone mainstream, thanks in part to the hacking of the 2016 Presidential election. But how many of us know how the attackers in this case actually achieved their ends? The truth is, that one of the oldest, but most effective weapons in the cybercriminal’s arsenal, undoubtedly used in those attacks, is a threat...
    The post Phishing, Part 1: On the Lookout appeared first on .
  • Which specific malware trends should American businesses be prepared for?

    Trend Micro - Cloud Security Blog
    In 2017, more than 700 million malware specimens were discovered. In this type of environment, it can be a considerable challenge for enterprises to keep up with the ever-changing threat landscape and ensure their internal protections are sufficient for safeguarding their most critical IT assets and data. After all, with each new day comes a sophisticated...
    The post Which specific malware trends should American businesses be prepared for? appeared first on .
  • This Week in Security News: Scams and Security Risks

    Trend Micro - Cloud Security Blog
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, the EU and Japan finalized an agreement enabling the cross-border transfer of data. Also, businesses are turning to machine learning to combat data threats. Read on to...
    The post This Week in Security News: Scams and Security Risks appeared first on .
  • Zero-Day Coverage Update – Week of July 23, 2018

    Trend Micro - Cloud Security Blog
    We’re at the end of July and the Zero Day Initiative (ZDI) has published 873 advisories so far. That’s 273 advisories this month alone – and that’s just the tip of the iceberg! Earlier this week, ZDI announced the Targeted Incentive Program, which brings over $1,500,000 USD in special bounty awards for specific targets. With...
    The post Zero-Day Coverage Update – Week of July 23, 2018 appeared first on .
  • Is chat putting your business at risk?

    Trend Micro - Cloud Security Blog
    Now that corporate activities are increasingly taking place outside of the office, technology that enables real-time communication and collaboration among office workers and telecommuters is absolutely essential. Elements like file sharing, video conferencing and cloud access have quickly become imperative. However, few solutions address the challenges that can come up with geographically dispersed workers like...
    The post Is chat putting your business at risk? appeared first on .
  • Our Extensive Survey on IoT Cybersecurity Has Remarkable Top Consequence

    Trend Micro - Cloud Security Blog
    Trend Micro recently conducted a global survey of IT and security decision makers. When asked about the top consequence to IoT security, many would have expected it to be data loss. However, the top consequence named with 52% of respondents was “Loss of Customer Trust.” IoT has a physical component that is unusual in the...
    The post Our Extensive Survey on IoT Cybersecurity Has Remarkable Top Consequence appeared first on .
  • Preparing for Shadow OT: A Hospital Case Study

    Trend Micro - Cloud Security Blog
    The convergence of IT and OT is happening more rapidly than IT expects. Once upon a time, IT was so expensive that enterprises built entire departments to prioritize spending and efficiently manage those costly investments. Now, IT is so inexpensive that any individual who wants IT can buy it (or rent it). This is “Shadow...
    The post Preparing for Shadow OT: A Hospital Case Study appeared first on .
  • What financial service providers should know about blockchain: Opportunities and threats

    Trend Micro - Cloud Security Blog
    It seems that every few years, an advanced and innovative new technology emerges and becomes the next big thing for organizations across different industries. Take the cloud and big data, for example – during their buzzword stage, these concepts were being attached to just about everything in the tech space. Currently, it appears that blockchain...
    The post What financial service providers should know about blockchain: Opportunities and threats appeared first on .
  • The trend toward cryptojacking: What it is and how businesses can prevent it

    Trend Micro - Cloud Security Blog
    Digital attacks have evolved quite a bit in recent years. First, businesses and researchers observed a rash of ransomware, wherein encryption was exploited to lock users out of their data and files in an attempt to collect financial ransom. Now, the next big wave in cybercriminal strategy has come, involving increasingly popular cryptocurrencies and the...
    The post The trend toward cryptojacking: What it is and how businesses can prevent it appeared first on .

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release