simply-security-logo

 

  • Endpoint Security Testing Matters: New NSS AEP Test Results

    NSS Labs, Inc. has just released the 2018 edition of their Advanced Endpoint Protection testing, and Trend Micro’s endpoint solutions have performed very well, resulting in a “recommended” rating. We had strong performance on “security effectiveness,” meaning that we detected and blocked threats effectively. We also

    ...
  • The Human (Resource) Role in the Journey to GDPR Compliance

    Employees are at the center of dealing with the General Data Protection Regulation (GDPR), which is the new European regulation that aims to strengthen and standardize the data pricy rights of European citizens. As we’ve discussed throughout this blog series, the GDPR impacts many organizations processing customer data

    ...
  • The connected workforce: The importance of protecting home and corporate networks

    In an age when data breaches are occurring increasingly frequently, it’s critical that chief information security officers and other IT admins don’t disregard the risk employees’ at-home activities can pose to their business security posture.

    The post ...

  • The Cybersecurity Tech Accord: Time to Come Together to Combat Digital Threats

    At Trend Micro we’re committed to making the world a safer place in which to exchange digital information. In fact, we’ve been protecting our customers from the ever-evolving threat landscape for nearly 30 years. But we know we can and must do more as an industry to combat the challenges we face today. That’s

    ...
  • Arm your users with knowledge to spot phishing attacks – for free!

    Attendees to the Black Hat 2017 security conference said their No. 1 security concern and most time-consuming activity was phishing and social engineering attacks. That’s no surprise with the increase in Business Email Compromise (BEC) attacks and with most ransomware being delivered by email. But Black Hat Attendees

    ...
  • Leveraging the Power of AI to Stop Email Scammers

    Staff members are on the frontline when it comes to cyberattacks against their employers. They’re increasingly seen by hackers as a weak link in the cybersecurity chain. That’s why most threats today come via email, aimed squarely at tricking the recipient into downloading malware, divulging log-ins or making wire

    ...
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 9, 2018

    The interviewing process can be mentally draining. You have to look your best, say the right things, and prove that you’re the best person for the job. When I interview candidates, I love to come up with the one crazy question that isn’t on the usual list of questions that might be asked. I probably...

    The post

    ...
  • This Week in Security News: Corporate Vulnerability and Cyber Threats

    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, a new cyber threat report reveals the vulnerability of small businesses and a new ransomware could infect your software to steal your passwords. Read on to

    ...
  • NIST Cybersecurity Framework Series Part 5: Recover

    The final part of NIST's Cybersecurity Framework is the Recover function. 

    The post NIST Cybersecurity Framework Series Part 5: Recover appeared first on ...

  • Sharing the Journey to GDPR Compliance

    Customer data is everything at Trend Micro. As a global cybersecurity leader, protecting customer data is what we do for a living, which is why it’s important for us to put into practice what we talk to our customers about. As a demonstration of our commitment to protecting our millions of customers, we treat

    ...