simply-security-logo

 

  • Is My Mac Secure from Malware and Viruses?

    Do you own a Mac? If so, you might have the common perception that they’re more secure from internet threats than Windows PCs. Unfortunately, this isn’t the case. The truth is that Macs have historically not been targeted by hackers as frequently as Windows systems, simply because there were fewer to attack, so it

    ...
  • Scan QR Codes Safely with the Trend Micro QR Scanner

    Using your camera and a QR code scanner on your mobile device, it’s easy to scan a code to download an app or go to a website—a bit too easy, some might say. What if the QR code is for a malicious app, or takes you to a dangerous website? How would you know before...

    The post ...

  • Celebrating the life of Tamir Segal

    Trend Micro may be a global organization of more than 5,000 employees, but we’re also a tight-knit family. So it was with great sadness and shock that we heard of the passing of Tamir Segal, who has served as our Israel Country Manager for the past eight years. Our thoughts and prayers are with his...

    The post

    ...
  • This Week in Security News: Cyber Leads and Email Frauds

    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, The Trump Administration added a cyber lead at Homeland Security and the Energy Department. Also, the FBI announced the arrest of 74 “email fraudsters” on Monday.

    ...
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 11, 2018

    As a native Texan, I’ve seen more than my fair share of bugs – actual physical bugs that love the hot, humid Texas climate and my curly hair for some reason. The Zero Day Initiative (ZDI) sees many bugs (of the software variety), including those that affect SCADA control systems. Fritz Sands recently walked

    ...
  • Don’t be a Coinmining Zombie – Part 2: How Do You Protect Yourself from being Cryptojacked?

    Safe behaviors to protect yourself from cryptojacking follow the familiar rules you should adhere to every day to protect yourself against viruses, worms, bots, and malware, including ransomware, which are typically pushed to you through phishing techniques and social engineering:     Strengthen your network

    ...
  • Security In A DevOps World

    [Originally presented at the Gartner Security & Risk Management Summit 2018, “Security In A DevOps World” examines the challenges and benefits of integrating security technology and thinking into the development process at the early stages. The slides are designed to assist in the presentation of the

    ...
  • Extending Trend Micro’s Container Protection with Deep Security Smart Check

    DevOps is not a single person or business unit, it is a development philosophy that exists within many organizations. DevOps teams build new applications for business growth, and extend critical monolithic applications into modern architectures. A key tenet of this philosophy uses microservices to make applications

    ...
  • Securing Containers at Scale: Amazon EKS, Amazon ECS and Deep Security Smart Check

    Containers present a new opportunity for teams. An opportunity to deploy faster, more consistently, and with a simplicity rarely seen. But in order to make that happen a lot of infrastructure needs to be setup ahead of time. A cluster of hosts for the container runtime, an orchestration layer, and—of course—security

    ...
  • AWS Invites Trend Micro to Give a Sneak Peek Of Our New Stuff

    You can tell a lot by the company someone keeps. This is one of many reasons we are so proud to have been invited to present at an Amazon event today. Amazon is hosting an EKoS Day in San Francisco and will be highlighting their newly launched Amazon EKS offering. We are giving a sneak...

    The post ...