Trend Micro has been named a Leader in the Gartner 2018 Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS) again. We have improved our position in both Completeness of Vision and Ability to Execute from last year, and we believe that placement in the Leaders’ quadrant illustrates our commitment to meeting the growing security and performance requirements of data centers and high-performance enterprise networks. Continue reading
Today Trend Micro’s FTR team released more papers on our continued investigation into our exposed world. Already having looked at the Exposed US, we now turn our attention to Europe, looking not only at Western European capitals, but deeper into three of its largest countries – Germany, France, and the United Kingdom. Continue reading
The past 12 months have been packed with geopolitical incident, global malware threats and ubiquitous big-name data breaches. From the CIA Vault7 and NSA Shadow Brokers leaks at the start of the year, to the WannaCry and NotPetya ‘ransomware’ campaigns, and Uber’s shock revelations just last month, there’s been plenty for CISOs to ruminate on. But now the year is nearly at an end, it might be useful to recap some of the biggest themes of 2017 — with an eye on fortifying systems for the 12 months to come. Continue reading
There’s an old English Christmas carol “The 12 Days of Christmas”, a cumulative song about 12 gifts that keep getting ‘grander’. As our Christmas gift to you, we wanted to list the top threats to be aware of heading into 2018, from least to most pressing. Let’s look at the vulnerabilities and potential points of attack to take into account for next year’s priorities: Continue reading
Vulnerabilities and their exploitation are still the root cause of most breaches. Astonishingly, Gartner predicts that through 2020, 99% of the vulnerabilities exploited will continue to be the ones known by security and IT professionals for at least one year!
The problem is not new to security specialists, but it gradually sinks in with the rest of the world as well: the more pacemakers are connected to the internet for any form of communication, the more security risks arise. Following a recall action by pacemaker manufacturer Abbott, thousands of Belgians had to come to the hospital to have their device upgraded, on order to shield it from possible hacking events. Continue reading
Consumers and cybersecurity professionals around the world have been stunned by Uber’s revelation that it paid hackers $100,000 to delete data on 57 million users stolen last year. There are many strands to the case, and more details are likely to emerge over time. But fundamentally it highlights the need for firms to secure their cloud environments as rigorously as anything on premise.
With the EU GDPR promising huge fines for firms that fail to suitably protect customer data, companies must realise that when it comes to the cloud, you simply can’t outsource accountability. Continue reading
Astonishing results in our GDPR survey among top managers in Europe and the United States: most managers excel at foolhardiness and ignorance. Equally astonishing news last summer for Game of Thrones fans: the plot of the season 7 finale was leaked online weeks before the tv broadcast. If you think these two facts are unrelated, think again! Continue reading
The need for more technologists with cybersecurity skills is undeniable. That may be an awkward way to phrase it, but it’s a better representation that “cybersecurity professionals.” In today’s world, everyone who works on and with technology needs to be aware of cybersecurity challenges. This week as part of National Cyber Security Awareness Month (NCSAM), let’s take a closer look at what a career in cybersecurity looks like. Continue reading