simply-security-logo

 

  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of July 17, 2017
    If you conduct a search on the Web for the number of languages spoken around the world, you’ll see numbers ranging anywhere from 6,000-7,000. I figure I’m doing okay since I can speak English and Spanish, sign the English alphabet, recite the Greek alphabet, and read music. There are roughly over 1.2 billion web sites...
  • This Week in Security News
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for...
  • Did you see what the Black Hat newsletter said about Trend Micro?
    This year’s Black Hat® conference is right around the corner. Now, amazingly, in its 20th year, Black Hat is one of the world’s top gathering of information security professionals. Friends in the industry refer to this as “Security Summer Camp” and it’s true, between the training, briefings, arsenal, and business hall,...
  • What to Consider When Choosing a Security Vendor
    Picking a security vendor for your managed service business should be about business model alignment, not product cost. If you’re a seasoned managed service provider (MSP), you are already very familiar with the benefits of the pay-as-you-go business model. In fact, it’s most likely how you sell your services to your...
  • This Week in Security News
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for...
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of July 10, 2017
    Before the world of laptops, tablets and smart phones, some of us had to use paper-based solutions to keep track of our calendars and to-do lists. I used a Franklin Planner, where I kept track of my calendar as well as my never-ending to-do list. The Franklin Planner used the “ABC” system to help you...
  • Security for a Rapidly Changing World: Why XGen™ is Our Formula for Success
    Right now, we’re living through a period of almost unprecedented technological change. It can be easy sometimes to get caught up in the excitement of this change and miss the bigger picture; the wider themes that tie our past to our future. That’s why at Trend Micro we’re proud to have been able to execute...
  • Not All Threats Are Created Equal
    In today’s world, security teams are bombarded constantly with security events and threat information from multiple sources, making it impossible to address each threat with the same amount of urgency. Where does one even start? We know every threat should be addressed, but not all threats are created equal. How do we...
  • Exploit Kit Attacks on the Rise as Astrum Emerges
    A powerful exploit kit known as Astrum recently made its way back into the cyber attack limelight.
  • What Can The Dark Web Teach Us About Enterprise Security?
    By studying the Deep Web, organizations can get a better sense of the overall threat environment - and be more prepared to guard against emerging vulnerabilities and attacks.