Trend Micro

Many water and energy systems vulnerable to significant cyber risk
New Trend Micro research revealed how exposed human machine interface (HMI) systems in thousands of critical water and energy organizations around the world could be …

New infosec products of the week: October 19, 2018
IBM rolls out cybersecurity operations center on wheels IBM Security launched the mobile Security Operations Center, capable of traveling onsite for cybersecurity training, …
Trend Micro redefines endpoint security with Trend Micro Apex One
Trend Micro launched the evolution of its endpoint security offering. Now re-branded as Trend Micro Apex One, the product redefines endpoint security with the capabilities …

October 2018 Patch Tuesday: Microsoft fixes 49 flaws, one APT-wielded zero-day
With the October 2018 Patch Tuesday release Microsoft has fixed 49 vulnerabilities, 12 of which are rated “critical.” Previously known flaws and an actively …

September 2018 Patch Tuesday: Microsoft fixes actively exploited zero-day
Microsoft’s September 2018 Patch Tuesday has brought fixes for a little over 60 security vulnerabilities, 17 of which are critical and one is being actively exploited in …
Trend Micro and HITRUST launch new company to provide cyber risk management as a service
Trend Micro and HITRUST announced they are partnering to launch Cysiv, a new company which provides cyber risk management as a service to select U.S. enterprises that need to …

What can we do to reverse the cybersecurity skills shortage?
An ever widening cybersecurity skills gap is making comprehensive cyber security protection – based on a combination of the latest tools and internal expertise – …

IT security teams are being locked out of IoT projects
Trend Micro revealed that organizations around the world are exposing themselves to unnecessary cyber risk by failing to give IT security teams a voice when planning IoT …
Trend Micro teams up with Moxa to secure and accelerate IIoT applications
Trend Micro has announced a new partnership with Moxa as part of its Technology Alliance Partner Program to jointly develop solutions to protect Industrial Internet of Things …

Cybercriminals shift tools, tactics and procedures to improve infection rates
Trend Micro released its Midyear Security Roundup 2018, revealing that cybercriminals are moving away from attention-grabbing ransomware attacks to more covert methods …
Trend Micro simplifies advanced threat detection and network analysis
Trend Micro introduced advanced analytics capabilities for its network security solution, Deep Discovery. Now in addition to detecting and analyzing threats on the network, …

New infosec products of the week: August 24, 2018
DefenseCode announces free edition of their Web Security Scanner DefenseCode Web Security Scanner is a DAST (Dynamic Application Security Testing) product for testing security …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility