Trend Micro
Trend Micro unveils cloud-native security customized to the demand of DevOps
Trend Micro, a global leader in cybersecurity solutions, announced the availability of the industry’s most complete security from a single solution protecting across cloud and …
Trend Micro extends protection to cover GCP, containers, Gmail
Trend Micro, a global leader in cybersecurity solutions, announced enhancements to its Deep Security and Cloud App Security products designed to extend protection to virtual …

April 2019 Patch Tuesday: Microsoft fixes two actively exploited bugs
Microsoft has plugged 74 CVE-numbered security holes on this April 2019 Patch Tuesday, including two vulnerabilities actively exploited by attackers. All of the bugs are rated …

The unique business-critical threats facing converged IT-OT systems
Manufacturing networks still running outdated technology could risk their intellectual property and production processes. The Trend Micro report, Securing Smart Factories: …
Trend Micro partners with Luxoft Holding to introduce a comprehensive cybersecurity solution
Trend Micro, a global leader in cybersecurity solutions, announced a strategic partnership with Luxoft Holding, a global digital strategy and engineering firm. The two …

Cost of telecommunications fraud estimated at €29 billion a year
As our society evolves, so does our reliance on telecommunications technology. Cybercriminals prey on our daily use of electronic devices and continuously seek out new ways to …

Nearly half of organizations lack the necessary talent to maintain security measures
Regardless of their size, organizations share a common challenge: IT security teams are understaffed and overextended. The number of security alerts, the challenge of what to …

IoT automation platforms open smart buildings to new threats
IoT automation platforms in smart buildings are presenting attackers with new opportunities for both physical and data compromise, Trend Micro researchers warn in a newly …

Businesses need to rethink security priorities due to shifting trends
One shift in attacks that businesses should be aware of is the rapid growth of cryptocurrency mining, which increased 237 percent, according to the 2018 Security Roundup …
Trend Micro launches new product for telecom companies to better protect their users
Trend Micro, a global leader in cybersecurity solutions, announced a comprehensive security suite designed for telecom companies to deploy to better protect their users. This …

Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
Along with Emotet, Trickbot has become one of the most versatile and dangerous pieces of modular malware hitting enterprise environments. Most recently, its creators have …

Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats
80 percent of IT business leaders anticipate a critical breach or successful cyberattack over the coming year, according to the Cyber Risk Index (CRI), a Trend Micro survey of …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility