Top IT Security Bloggers

Trend Micro - Cloud Security Blog
  • Which Threats had the Most Impact During the First Half of 2018?

    Trend Micro - Cloud Security Blog
    One of the best ways for organizations to shore up their data security efforts and work toward more proactive protection is by examining trends within the threat environment. Taking a look at the strategies for attack, infiltration and infection currently being utilized by hackers can point toward the types of security issues that will continue...
    The post Which Threats had the Most Impact During the First Half of 2018? appeared first on .
  • Cyber-Attacks: How to Stop a Multibillion-Dollar Problem

    Trend Micro - Cloud Security Blog
    By Ed Cabrera, Chief Cybersecurity Officer for Trend Micro and Martin Bally, Vice President & Chief Security Officer for Diebold Nixdorf  Where there’s money, there has always been crime. Traditional bank robbery and physical assaults on ATMs are still a challenge, and now a new breed of cyber-enabled theft—using ATMs as the endpoint for cash-outs— has become a multibillion-dollar...
    The post Cyber-Attacks: How to Stop a Multibillion-Dollar Problem appeared first on .
  • This Week in Security News: Spam Campaigns and Vulnerable Infrastructures

    Trend Micro - Cloud Security Blog
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, see how cybercriminals have learned to become more creative with malware through spam campaigns. Also, understand why securing energy and water should remain top priority in integration...
    The post This Week in Security News: Spam Campaigns and Vulnerable Infrastructures appeared first on .
  • Threat Intelligence, the Dark Web and Information sharing: Supporting improved protection

    Trend Micro - Cloud Security Blog
    There are numerous different elements and obstacles that contribute to the challenges of data protection in the current threat environment. However, a leading issue is ensuring protection against the latest, emerging attack styles and breach strategies. After all, how can an organization ensure the security of its most critical information and assets if they don’t...
    The post Threat Intelligence, the Dark Web and Information sharing: Supporting improved protection appeared first on .
  • Information security: How Hackers Leverage Stolen Data for Profit

    Trend Micro - Cloud Security Blog
    Data theft is inarguably big business for hackers. This has been proven time and time again when big-name companies and their customers are involved in a data breach. As these instances appear to take place more often, and the number of stolen or compromised files continues to rise, it’s worth looking into exactly what hackers...
    The post Information security: How Hackers Leverage Stolen Data for Profit appeared first on .
  • Extending Public-Private Partnerships with Milipol

    Trend Micro - Cloud Security Blog
    By: Loïc Guézo At Trend Micro, we’ve been protecting consumers, SMBs, enterprises and government customers from the latest threats for three decades now. This has required us to build a global team of experienced researchers, state-of-the-art R&D labs and much more, to fuel our industry-leading cybersecurity solutions. We also understand that there’s a bigger picture...
    The post Extending Public-Private Partnerships with Milipol appeared first on .
  • Ransomware Threat Continues: How Infections Take Place

    Trend Micro - Cloud Security Blog
    If cybersecurity consultants and IT admins have learned anything of the current threat environment, it’s that ransomware will continue to be a pervasive and dangerous threat to individual users, enterprises and organizations at large. When they first emerged, these infections were unlike anything that tech experts had ever seen, combining strong encryption and blackmail tactics...
    The post Ransomware Threat Continues: How Infections Take Place appeared first on .
  • This Week in Security News: Toll Fraud & Small Business Struggles

    Trend Micro - Cloud Security Blog
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn why telecommunications fraud has turned into a multi-billion euro criminal industry. Also, understand what cybersecurity struggles small businesses still face after the NIST Small Business Cybersecurity Act...
    The post This Week in Security News: Toll Fraud & Small Business Struggles appeared first on .
  • The Patching Problem: Best Practices for Maintaining Up-to-Date Systems

    Trend Micro - Cloud Security Blog
    “Update ready to be installed.” IT teams and business stakeholders are probably familiar with this notification, or something like it. After all, software updates are nothing new: Whenever a vendor makes improvements or includes new capabilities on a previously-released platform, it comes with a software update. But boosting existing features aren’t the only reason that patching...
    The post The Patching Problem: Best Practices for Maintaining Up-to-Date Systems appeared first on .
  • Best Practices for Endpoint Detection and Response

    Trend Micro - Cloud Security Blog
    There are many elements that can complicate enterprise security efforts. From the increasing sophistication of cybercriminal strategies and activities to the wide range of components connected to the network, data protection and infrastructure security has become an uphill battle. Another key factor to consider here is the array of different endpoints connected to and communicating through...
    The post Best Practices for Endpoint Detection and Response appeared first on .

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release