simply-security-logo

 

  • Securing Our Connected Car Future with Panasonic
    There are few more exciting frontiers of the Internet of Things (IoT) than connected cars. Gartner predicts that there will be 61 million vehicles with built-in connectivity on our roads by 2020. But as we drive ever closer to a future where autonomous vehicles are a commonplace sight, we must be alert to the...
  • This Week in Security News: Senate Hearings and Equifax Breaches
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, leaders of six security agencies testified before the Senate Intelligence Committee, the Equifax hack grew in severity, and hackers used the power of Machine Learning...
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 12, 2018
    Valentine’s Day was earlier this week, and there was so much love in the air. There was also a lot of love in the Trend Micro world as our teams worked diligently to make sure our customers were protected from this month’s bevy of critical vulnerabilities across several vendors. This week, we focus on Microsoft,...
  • How Hackers Are Leveraging Machine Learning
    Unfortunately, like many advanced and innovative technological processes, machine learning can be leveraged for both beneficial enterprise purposes as well as malicious activity.
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 5, 2018
    It was a busy week in the cyber security world, but it shouldn’t be surprising given that the 2018 Winter Olympics in Pyeongchang have begun. I shouldn’t blame just the Olympics, but it’s hard not to given the international focus, controversy around the ban of certain athletes and its proximity to a certain country. So...
  • This Week in Security News: Botnets and Breaches
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, North Korean hackers overtook Adobe, Trend Micro Safety Solutions discovered new a botnet, and the threat of third-party cyber breaches made large corporations...
  • Security Glue Between the Silos of Endpoint, Server, Cloud and Network Security Gets More Critical
    Endpoint and Host security techniques have diverged. There used to be considerable similarity between the techniques and tools used to secure desktops, servers, and even networks. Desktops evolved to become Endpoints, as mobile devices proliferated and they were assembled into a collective of being in the category of...
  • A Look Back: Reviewing the Worst Cyber Attacks of 2017 and the Lessons Learned
    Hackers aren’t easing up on business or consumer targets anytime soon. So the best course of action for the industry to take is to apply the lessons learned from these attacks to future protection strategies.
  • How hackers recycle top threats
    Hackers have recycled and repacked older exploits that worked well in the past to create a completely new threat.
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of January 29, 2018
    Late last year, Trend Micro introduced its Security Predictions for 2018. One of the predictions stated that digital extortion will be at the core of most cybercriminals’ business model. It’s much more than just ransomware – it is the most successful criminal business model in the current threat landscape. Valuable...