Author Archives: Steven Heyde

Trend Micro Named a Leader in 2018 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS)

Trend Micro has been named a Leader in the Gartner 2018 Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS) again. We have improved our position in both Completeness of Vision and Ability to Execute from last year, and we believe that placement in the Leaders’ quadrant illustrates our commitment to meeting the growing security and performance requirements of data centers and high-performance enterprise networks. Continue reading

Security Round-up: Five Things We’ve Learned in 2017

The past 12 months have been packed with geopolitical incident, global malware threats and ubiquitous big-name data breaches. From the CIA Vault7 and NSA Shadow Brokers leaks at the start of the year, to the WannaCry and NotPetya ‘ransomware’ campaigns, and Uber’s shock revelations just last month, there’s been plenty for CISOs to ruminate on. But now the year is nearly at an end, it might be useful to recap some of the biggest themes of 2017 — with an eye on fortifying systems for the 12 months to come. Continue reading

You Can’t Outsource Accountability: Uber Breach Highlights Firms’ Cloud Security Responsibilities

Consumers and cybersecurity professionals around the world have been stunned by Uber’s revelation that it paid hackers $100,000 to delete data on 57 million users stolen last year. There are many strands to the case, and more details are likely to emerge over time. But fundamentally it highlights the need for firms to secure their cloud environments as rigorously as anything on premise.

With the EU GDPR promising huge fines for firms that fail to suitably protect customer data, companies must realise that when it comes to the cloud, you simply can’t outsource accountability. Continue reading

From GDPR to Game of Thrones: ‘winter is coming’ for security officers?

Astonishing results in our GDPR survey among top managers in Europe and the United States: most managers excel at foolhardiness and ignorance. Equally astonishing news last summer for Game of Thrones fans: the plot of the season 7 finale was leaked online weeks before the tv broadcast. If you think these two facts are unrelated, think again! Continue reading

Meet Stephane Bonifazzi, our new territory manager for Luxembourg

Today is a perfect day to look back on the past two years. Since the moment we decided to strengthen our focus on Luxembourg, we have successfully managed to grow our business. And to build a stable platform for further growth and innovation with our local presence and dedication. And we are ready to realize this growth potential in the next few years. With our previous territory manager, Frédéric Dohen, leaving his position, we believe we have found the man to realize these ambitions: Stephane Bonifazzi.

Continue reading

Randstad Group Selects Trend Micro to Protect its Public Cloud Infrastructure

The Randstad Group is currently in the process of consolidating and centralizing its IT infrastructure across 30 IT departments, and will be providing service to more than 40 operating countries across four continents. To ensure the new infrastructure will have optimal security the company selected Trend Micro as its cloud security solution partner for the next five years.  Continue reading

Looking back on our predictions for 2016: utter nonsense or harsh reality?

Every year, around the new year, we are bombarded with lists of predictions for the coming year. In December 2015, the Trend Micro research team joined in a round of crystal ball gazing. Based on their insights in the ever-evolving cybercrime trends, they formulated some predictions about what to expect in 2016. One year later, as we are entering yet another new year and, once again, looking forward to new trends and developments in 2017, we would also like to take the time to look back and ask ourselves: were these predictions nonsense, or did 2016 prove them to be hard reality? Continue reading

Five Cybersecurity Resolutions Every CISO Should Have On Their List

As we bid farewell to the final days of 2016, it’s time to start looking ahead to the New Year and what we hope to accomplish within the next 365 days. Year after year, some Chief Information Security Officers (CISOs) set lofty goals of securing all data to fullest extent wherever it resides in their company’s network. However, as many New Year resolutions go, these aspirations often fall because they’re not founded on sound enterprise risk management principles. Continue reading

The risks of using pagers in healthcare

5 attack scenarios and 3 tips how to avoid them

Article written by specialists at the Trend Micro Foward-Looking Threat Research Lab

Over sixty years ago, healthcare professionals were among the first to adopt a new communication tool: the pager. This little instrument combined technology from walkie-talkies and automobile radios, resulting in a handy little tool that allowed the transmission of messages (or ‘pages’) to other pagers up to 25 miles away. And although smartphones have taken over communication in the outside world, the healthcare industry has never really said goodbye to pagers. They offer a few crucial advantages to healthcare professionals: they don’t suffer from the often weak cellular coverage in hospitals nor do they interfere with medical equipment. Continue reading