Enterprise Security News: Data Breaches: New Analysis Reveals Trends, Debunks Myths

1 jaar geleden


Text only:

October 2015
View in web browser
 
 
 
 
 
W2K3 EOL PROTECTION DEMO
Virtual Patching Protects Unsupported Applications
By now you know that if you're still running Windows Server 2003, you're at risk of attack. But even without vendor security updates, you can continue using your servers safely, with virtual patching, a core capability of Trend Micro™ Deep Security™ and other products. This step-by-step demo shows you exactly how it works.
 
DATA BREACH FINDINGS
Research on Data Breaches Reveals Trends, Risks, and More
Two new TrendLabs research papers prepared by Trend Micro's Forward-Looking Threat Research Team provide an in-depth look at data breaches, and debunk some common myths about them. Start with Christopher Budd's insightful blog, read a summary of the findings, or get the full reports here and here.
 
CHOOSING ENDPOINT PROTECTION
AV-TEST Results Help You Choose the Best Solution
When AV-TEST revealed the results of its July/August testing, Trend Micro™ OfficeScan™ clearly stood out among the top performers, with consistent high scores across many areas of testing. In this blog post, Andrew Stevens explains what the results mean, and why OfficeScan was rated best at stopping zero-day threats.
 
THE TALK-TALK TAKEDOWN
Massive Data Breach Exposes Lack of Planning, Accountability
In the aftermath of a massive data breach affecting as many as 4 million customers, it's become evident that English telco Talk-Talk was woefully underprepared for this sort of attack. With no CSO/CISO to lead security planning and implementation, the ultimate outcome may be the company's collapse. Rik Ferguson explores the issues in this blog.
 
HOW TO KEEP YOUR CSO JOB
Raimund Genes Interview: Questions to Ask BEFORE a Breach
Bill Murphy is known for interviewing thought leaders and innovators across a wide spectrum of industries. In this podcast, Trend Micro CTO Raimund Genes opens up about how CSOs and CIOs can lay the groundwork before an attack to minimize the damage—to both the business and to their careers—that may come after.
 
ENHANCED AWS SECURITY
New AWS Service Perfect Complement to Deep Security
During AWS re:Invent 2015, AWS announced several new services that will soon be available. Amazon Inspector will analyze activity within your instances, compare to best practices, and report on potential security risks—making it easy for Deep Security users to instantly address them. Mark Nunnikhoven's blog post gives you the details.
 
SONY HACK ANNIVERSARY
Burning Down the House: Sony Was Not Alone
The attack that devastated Sony one year ago made a lot of waves. But as attack tools proliferate on the dark web, sophisticated, large-scale, and potentially destructive attacks are on the rise. In a recent blog, Trend Micro Chief Cybersecurity Officer Tom Kellermann explains why it's happening, and what it means for security to keep up.
 
VMWARE NSX VIDEO
Security for Your Software-Defined Data Center Strategy
As you move to adopt the software-defined data center, VMware NSX can optimize the value of your investment. This video shows how—and demonstrates why Trend Micro's long-standing partnership with VMware delivers fully integrated security that adapts to your changing needs as your virtualization strategy evolves.
 
JAPANESE UNDERGROUND REPORT
Researchers Find "Immature" Market, With Plenty of Risk
Our Forward-looking Threat Research team decided to look into the cyber-criminal underground outside of China and Russia. What they found in Japan provides valuable insights on securing your international transactions. Read Christopher Budd's summary blog post or get the full report to learn how the researchers arrived at their conclusions.
 
SHUT DOWN EMAIL THREATS
Spear-phishing and Ransomware on the Rise—How to Fight Back
With ransomware and spear-phishing attacks increasing, it's important to keep your security measures up to date. Trend Micro™ Hosted Email Security has been enhanced with new capabilities that give you powerful new ways to detect and disable these dangerous attacks. This blog post from Richard Medugno gives you the details.
 
IN THE NEWS
NY TIMES: Chinese Hackers Breached LoopPay, Whose Tech Is Central to Samsung Pay
CSO: What Will the CISOs of 2020 Look Like?
EAST-WEST INSTITUTE: What Do the Obama-Xi Agreements Mean for Cyber?
Home  | 
Blogs  | 
For Business  | 
Threat Research  | 
Support  | 
Sales Contact Me
Copyright © 2015 Trend Micro Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice.
Subscribe to Trend Micro newsletters
This
message was sent by Trend Micro using technology from Responsys.
Unsubscribe from Trend Micro
e-mail at any time. View our permission marketing policy.
Legal Policies and Privacy · Contact UsTrend Micro,
Inc., 10101 N. De Anza Blvd, Cupertino, California 95014 USA
© Copyright Trend Micro, Inc. All rights reserved.

Trendmicro.com

Categorieën: Zakelijke goederen Ict Zzp | Zelfstandige zonder personeel Computers | Software
Leeftijd: 14 t/m 18 jaar 19 t/m 30 jaar 31 t/m 64 jaar 65 jaar en ouder

Deel deze nieuwsbrief op

© 2017