Quantcast
Channel: CTO Insights – TrendLabs Security Intelligence Blog
Browsing all 25 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

On AV Testing: Some Steps in the Right Direction

We’ve recently had the honor of meeting up with our partners and customers in the industry and of sharing insights during our annually held convention Direction 2010, held in Tokyo, Japan last July 7....

View Article



Image may be NSFW.
Clik here to view.

Trend Micro Predictions for 2013 and Beyond: Threats to Business, the Digital...

As the year draws to a close it’s time for us to take a step back, absorb the lessons of 2012, and look at what 2013 and beyond will bring for users, the security industry, and even cybercriminals....

View Article

Long Live Endpoint Protection!

Last month, an article in Dark Reading by Robert Lemos asked if it was “Time To Dump Antivirus As Endpoint Protection?“. It referenced a recent Google research paper that outlined their new reputation...

View Article

Vulnerability Disclosure – Open or Private?

At the end of May, two Google security engineers announced Mountain View’s new policy regarding zero-day bugs and disclosure. They strongly suggested that information about zero-day exploits currently...

View Article

Image may be NSFW.
Clik here to view.

2Q Security Roundup: Mobile Flaws Form Lasting Security Problems

Check out the TrendLabs 2Q 2013 Security Roundup. Threats on mobile platforms, devices, and applications have been swelling up over the past years; but this quarter, they have finally gone full...

View Article


2014 Predictions: Blurring Boundaries

The past year has been an interesting one in the world of cyber security. Mobile malware has become a large-scale threat, government surveillance has users asking “does privacy still exist?”,...

View Article

Mobile Banking and the Risks

There is no doubt that mobile banking is going to become very significant in 2014, if it isn’t already. In the United States, a quarter of all people selecting a bank say mobile banking is a...

View Article

Advice for Enterprises in 2014: Protect Your Core Data

It is an interesting time to be in IT security today. PRISM and Edward Snowden taught many lessons about how companies should secure their data. There’s been a lot of discussion about the surveillance...

View Article


Data Gathering Is a Two-Way Street

Today’s technology is becoming better and better at an exponential clip. It was only a few decades ago that we had cellphones the size of bricks and Internet the speed of which is only a fraction of a...

View Article


Privacy and the Right to be Forgotten

Last month, there was a very interesting decision out of the European Court of Justice. The decision established what can be called the “right to be forgotten“. People can now ask search engines like...

View Article

Securing the Internet of Everything

Whenever I hear about the Internet of Everything, I find myself somewhat conflicted. There’s no doubt that it is the new “mega trend” in technology, but at the same time I wonder how secure it is. Let...

View Article

Will Bitcoin Succeed?

When you work for a security company, sometimes people think you must know everything there is to know about technology. So sometimes I get asked, “Will Bitcoin and other cryptocurrencies succeed?”...

View Article

Rebuilding Trust: Keeping Your Data Safe

For the past year or so, I’ve noticed that people are getting increasingly concerned about how protected their information is – not just from hackers, but from governments and large Internet companies...

View Article


Mobile App Developers: Compete on Privacy and Security, Too

There are many mobile app developers today who want to develop the next hot mobile app. After all, if you pay your cards right, you could end up being bought by a much larger company like Facebook,...

View Article

Setting Up Your Gadgets Securely

It’s that time of year again – the last quarter of the year is a time for many of us to buy a new smartphone, as we look at the new devices launched relatively recently by Apple, Samsung, and all the...

View Article


Mobile Virtualization – Solving the BYOD Problem

For many users today, how they use technology is defined by mobile devices. Their primary device is not a desktop computer, or even a laptop. Instead, it’s a tablet or a smartphone. Instead of data...

View Article

CTO Insights: Light Can Keep the Dark at Bay

We are all afraid of the unknown.  Why? Because we all want to be in control of our lives: what career path to take, how to deal with our finances, where to go for a vacation. We like certainty. We...

View Article


CTO Insights: Vulnerabilities for Sale

2014 showed that vulnerabilities could be found in all applications – both Heartbleed and Shellshock caught system administrators off-guard by revealing that open-source server applications could have...

View Article

CTO Insights: Defending Your Organization From Insider Attacks

If you’ve read enough crime novels or seen enough action movies, the plot is all too familiar to you: an insider – acting to correct some slight or insult he or she received years ago – turns against...

View Article

CTO Insights: Internet of Things — Whose Data Is It, Anyway?

Everywhere you look, it seems to be that everything is becoming “smart”.  On my wrist, I frequently wear a smart watch that monitors how many steps I take, what my heart rate is, and so on. At home, a...

View Article
Browsing all 25 articles
Browse latest View live




Latest Images