Top IT Security Bloggers

Trend Micro - Cloud Security Blog
  • Arm your users with knowledge to spot phishing attacks – for free!

    Trend Micro - Cloud Security Blog
    Attendees to the Black Hat 2017 security conference said their #1 security concern and most time-consuming activity was phishing and social engineering attacks. That’s no surprise with the increase in Business Email Compromise (BEC) attacks and with most ransomware being delivered by email. But Black Hat Attendees also said the weakest link in their security...
    The post Arm your users with knowledge to spot phishing attacks – for free! appeared first on .
  • Leveraging the Power of AI to Stop Email Scammers

    Trend Micro - Cloud Security Blog
    Staff members are on the frontline when it comes to cyberattacks against their employers. They’re increasingly seen by hackers as a weak link in the cybersecurity chain. That’s why most threats today come via email, aimed squarely at tricking the recipient into downloading malware, divulging log-ins or making wire transfers to the attacker. We predict...
    The post Leveraging the Power of AI to Stop Email Scammers appeared first on .
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 9, 2018

    Trend Micro - Cloud Security Blog
    The interviewing process can be mentally draining. You have to look your best, say the right things, and prove that you’re the best person for the job. When I interview candidates, I love to come up with the one crazy question that isn’t on the usual list of questions that might be asked. I probably...
    The post TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 9, 2018 appeared first on .
  • This Week in Security News: Corporate Vulnerability and Cyber Threats

    Trend Micro - Cloud Security Blog
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, a new cyber threat report reveals the vulnerability of small businesses and a new ransomware could infect your software to steal your passwords. Read on to learn...
    The post This Week in Security News: Corporate Vulnerability and Cyber Threats appeared first on .
  • NIST Cybersecurity Framework Series Part 5: Recover

    Trend Micro - Cloud Security Blog
    The final part of NIST's Cybersecurity Framework is the Recover function. 
    The post NIST Cybersecurity Framework Series Part 5: Recover appeared first on .
  • Sharing the Journey to GDPR Compliance

    Trend Micro - Cloud Security Blog
    Customer data is everything at Trend Micro. As a global cybersecurity leader, protecting customer data is what we do for a living, which is why it’s important for us to put into practice what we talk to our customers about. As a demonstration of our commitment to protecting our millions of customers, we treat all...
    The post Sharing the Journey to GDPR Compliance appeared first on .
  • Independent lab tests again prove the excellence of Trend Micro Mobile Security for Android

    Trend Micro - Cloud Security Blog
    Submitted by Ian Grutze For the fourth year in a row, as shown in AV Comparatives’ Anti-Virus Comparative Android Test 2018 – January 2018, Trend Micro Mobile Security for Android shows it provides 100% protection against malware. In this independent lab test, more than 200 mobile security products were tested by AV Comparatives against some...
    The post Independent lab tests again prove the excellence of Trend Micro Mobile Security for Android appeared first on .
  • The Role That IT Security Teams Need to Play in Connected Hospitals

    Trend Micro - Cloud Security Blog
    The WannaCry outbreak that reportedly raked in US$1B in damage costs also forced doctors to cancel scheduled appointments, among other things, brought on warranted concern over pervasive ransomware attacks that could stem from oft-overlooked components of healthcare networks—exposed medical cyber assets and third-party partners. It’s a well-known fact that advances in medical technology and information...
    The post The Role That IT Security Teams Need to Play in Connected Hospitals appeared first on .
  • Advancing threat protection through industry-leading research

    Trend Micro - Cloud Security Blog
    At Trend Micro we’ve been protecting our customers around the world for 30 years. So what’s the secret to staying at the cutting edge of the industry for all this time? By investing significant resources into forward-looking threat research, we’ve been able to anticipate where the black hats are going next. Over the coming weeks...
    The post Advancing threat protection through industry-leading research appeared first on .
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 19, 2018

    Trend Micro - Cloud Security Blog
    Back in 2005, there were a number of us in a conference room in Austin, Texas working to determine how we would structure it, what we would name it, and how to deal with the potential backlash that would come after we announced it. What is it? I’m referring to our Zero Day Initiative. It’s...
    The post TippingPoint Threat Intelligence and Zero-Day Coverage – Week of March 19, 2018 appeared first on .

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release