On AV Testing: Some Steps in the Right Direction
We’ve recently had the honor of meeting up with our partners and customers in the industry and of sharing insights during our annually held convention Direction 2010, held in Tokyo, Japan last July 7....
View ArticleTrend Micro Predictions for 2013 and Beyond: Threats to Business, the Digital...
As the year draws to a close it’s time for us to take a step back, absorb the lessons of 2012, and look at what 2013 and beyond will bring for users, the security industry, and even cybercriminals....
View ArticleLong Live Endpoint Protection!
Last month, an article in Dark Reading by Robert Lemos asked if it was “Time To Dump Antivirus As Endpoint Protection?“. It referenced a recent Google research paper that outlined their new reputation...
View ArticleVulnerability Disclosure – Open or Private?
At the end of May, two Google security engineers announced Mountain View’s new policy regarding zero-day bugs and disclosure. They strongly suggested that information about zero-day exploits currently...
View Article2Q Security Roundup: Mobile Flaws Form Lasting Security Problems
Check out the TrendLabs 2Q 2013 Security Roundup. Threats on mobile platforms, devices, and applications have been swelling up over the past years; but this quarter, they have finally gone full...
View Article2014 Predictions: Blurring Boundaries
The past year has been an interesting one in the world of cyber security. Mobile malware has become a large-scale threat, government surveillance has users asking “does privacy still exist?”,...
View ArticleMobile Banking and the Risks
There is no doubt that mobile banking is going to become very significant in 2014, if it isn’t already. In the United States, a quarter of all people selecting a bank say mobile banking is a...
View ArticleAdvice for Enterprises in 2014: Protect Your Core Data
It is an interesting time to be in IT security today. PRISM and Edward Snowden taught many lessons about how companies should secure their data. There’s been a lot of discussion about the surveillance...
View ArticleData Gathering Is a Two-Way Street
Today’s technology is becoming better and better at an exponential clip. It was only a few decades ago that we had cellphones the size of bricks and Internet the speed of which is only a fraction of a...
View ArticlePrivacy and the Right to be Forgotten
Last month, there was a very interesting decision out of the European Court of Justice. The decision established what can be called the “right to be forgotten“. People can now ask search engines like...
View ArticleSecuring the Internet of Everything
Whenever I hear about the Internet of Everything, I find myself somewhat conflicted. There’s no doubt that it is the new “mega trend” in technology, but at the same time I wonder how secure it is. Let...
View ArticleWill Bitcoin Succeed?
When you work for a security company, sometimes people think you must know everything there is to know about technology. So sometimes I get asked, “Will Bitcoin and other cryptocurrencies succeed?”...
View ArticleRebuilding Trust: Keeping Your Data Safe
For the past year or so, I’ve noticed that people are getting increasingly concerned about how protected their information is – not just from hackers, but from governments and large Internet companies...
View ArticleMobile App Developers: Compete on Privacy and Security, Too
There are many mobile app developers today who want to develop the next hot mobile app. After all, if you pay your cards right, you could end up being bought by a much larger company like Facebook,...
View ArticleSetting Up Your Gadgets Securely
It’s that time of year again – the last quarter of the year is a time for many of us to buy a new smartphone, as we look at the new devices launched relatively recently by Apple, Samsung, and all the...
View ArticleMobile Virtualization – Solving the BYOD Problem
For many users today, how they use technology is defined by mobile devices. Their primary device is not a desktop computer, or even a laptop. Instead, it’s a tablet or a smartphone. Instead of data...
View ArticleCTO Insights: Light Can Keep the Dark at Bay
We are all afraid of the unknown. Why? Because we all want to be in control of our lives: what career path to take, how to deal with our finances, where to go for a vacation. We like certainty. We...
View ArticleCTO Insights: Vulnerabilities for Sale
2014 showed that vulnerabilities could be found in all applications – both Heartbleed and Shellshock caught system administrators off-guard by revealing that open-source server applications could have...
View ArticleCTO Insights: Defending Your Organization From Insider Attacks
If you’ve read enough crime novels or seen enough action movies, the plot is all too familiar to you: an insider – acting to correct some slight or insult he or she received years ago – turns against...
View ArticleCTO Insights: Internet of Things — Whose Data Is It, Anyway?
Everywhere you look, it seems to be that everything is becoming “smart”. On my wrist, I frequently wear a smart watch that monitors how many steps I take, what my heart rate is, and so on. At home, a...
View Article
More Pages to Explore .....