From ransomware infections to cryptomining scams, fake factory honeypot provides lessons for CISOs

How tempting a target are companies with industrial control systems to online threat actors? A lot, according to a fake...

January 29th, 2020 Howard Solomon

Malware is going to get weirder in 2020, so it’s time for enterprises to get weird too, says Trend Micro exec

As we leave 2019 behind, a new year approaches. And with it comes the impending waves of new malware that...

December 20th, 2019 Buckley Smith

Trend Micro admits staffer stole and sold customer data

One of the biggest worries of CEOs and CISOs is that an employee will access and sell customer data. The...

November 6th, 2019 Howard Solomon

Trend Micro acquires Cloud Conformity

Trend Micro Inc. today expanded its cloud security portfolio through acquiring Cloud Security Posture Management (CSPM) firm Cloud Conformity Pty....

October 21st, 2019 Buckley Smith

Deploying and securing containers

Cloud-native apps are designed to exist and perform exclusively within the expansive framework of a virtual computing environment. Components of...

August 21st, 2019 Glenn Weir

Communications with security team still a barrier to successful DevOps, survey suggests

The movement to get software development teams working closely with IT operations for creating better code in a formal process...

July 5th, 2019 Howard Solomon

Security at the speed of DevOps is possible

DevOps brings with it the prospect of a revolution in how businesses satisfy the ever-changing needs of their customers —...

May 27th, 2019 Glenn Weir

3 women in tech size up the gender gap in 2019

Today is International Women's Day and in honor of that, we are speaking about the state of women in the...

March 8th, 2019 Buckley Smith

Prepare for the next level of cyber-attacks

The old cliché of the lone hacker, clacking away feverishly, blinds closed, coffee and cigarette his only companions, is well...

February 12th, 2019 Glenn Weir