Trend Micro Named a Leader in 2018 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS)

Trend Micro has been named a Leader in the Gartner 2018 Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS) again. We have improved our position in both Completeness of Vision and Ability to Execute from last year, and we believe that placement in the Leaders’ quadrant illustrates our commitment to meeting the growing security and performance requirements of data centers and high-performance enterprise networks. Continue reading

Our Exposed World – Exposed Cities in Europe

Today Trend Micro’s FTR team released more papers on our continued investigation into our exposed world. Already having looked at the Exposed US, we now turn our attention to Europe, looking not only at Western European capitals, but deeper into three of its largest countries – GermanyFrance, and the United Kingdom. Continue reading

Security Round-up: Five Things We’ve Learned in 2017

The past 12 months have been packed with geopolitical incident, global malware threats and ubiquitous big-name data breaches. From the CIA Vault7 and NSA Shadow Brokers leaks at the start of the year, to the WannaCry and NotPetya ‘ransomware’ campaigns, and Uber’s shock revelations just last month, there’s been plenty for CISOs to ruminate on. But now the year is nearly at an end, it might be useful to recap some of the biggest themes of 2017 — with an eye on fortifying systems for the 12 months to come. Continue reading

12 Threats of Christmas

There’s an old English Christmas carol “The 12 Days of Christmas”, a cumulative song about 12 gifts that keep getting ‘grander’. As our Christmas gift to you, we wanted to list the top threats to be aware of heading into 2018, from least to most pressing. Let’s look at the vulnerabilities and potential points of attack to take into account for next year’s priorities: Continue reading

Gartner Research: How to Prioritize and Remediate Active Vulnerabilities

Vulnerabilities and their exploitation are still the root cause of most breaches. Astonishingly, Gartner predicts that through 2020, 99% of the vulnerabilities exploited will continue to be the ones known by security and IT professionals for at least one year!

 

Continue reading

Pacemaker security risks: the ‘heart of the matter’ brought by RTL … and explained by Trend Micro

The problem is not new to security specialists, but it gradually sinks in with the rest of the world as well: the more pacemakers are connected to the internet for any form of communication, the more security risks arise. Following a recall action by pacemaker manufacturer Abbott, thousands of Belgians had to come to the hospital to have their device upgraded, on order to shield it from possible hacking events. Continue reading

You Can’t Outsource Accountability: Uber Breach Highlights Firms’ Cloud Security Responsibilities

Consumers and cybersecurity professionals around the world have been stunned by Uber’s revelation that it paid hackers $100,000 to delete data on 57 million users stolen last year. There are many strands to the case, and more details are likely to emerge over time. But fundamentally it highlights the need for firms to secure their cloud environments as rigorously as anything on premise.

With the EU GDPR promising huge fines for firms that fail to suitably protect customer data, companies must realise that when it comes to the cloud, you simply can’t outsource accountability. Continue reading

Beyond Catching Sender Spoofing – using AI to stop email fraud and Business Email Compromise

In September, we announced our new email security technologies powered by XGen™ and a new product, Smart Protection for Office 365. One key technology introduced was our new AI based Email fraud, or Business Email Compromise (BEC), detection technique. Continue reading

From GDPR to Game of Thrones: ‘winter is coming’ for security officers?

Astonishing results in our GDPR survey among top managers in Europe and the United States: most managers excel at foolhardiness and ignorance. Equally astonishing news last summer for Game of Thrones fans: the plot of the season 7 finale was leaked online weeks before the tv broadcast. If you think these two facts are unrelated, think again! Continue reading

Here’s Why You Should Consider A Career In Cybersecurity

The need for more technologists with cybersecurity skills is undeniable. That may be an awkward way to phrase it, but it’s a better representation that “cybersecurity professionals.” In today’s world, everyone who works on and with technology needs to be aware of cybersecurity challenges. This week as part of National Cyber Security Awareness Month (NCSAM), let’s take a closer look at what a career in cybersecurity looks like. Continue reading