simply-security-logo

 

  • Uber: How Not To Handle A Breach
    Uber is a company that is embattled on all fronts. From a very public power struggle to labour issues to regulatory challenges to a reportedly toxic culture, Uber sits in a precarious position. Yesterday, a new strike against the company came to light. In October 2016, Uber was hacked resulting in the exposure of 57...
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of November 20, 2017
    It’s that time of year again, when many will gather with their families, eat way too much, and catch those crazy Black Friday sales. I’ve been seeing “Black Friday” sales for almost two weeks now. Cyber Monday, which falls on the Monday after the U.S. Thanksgiving holiday, is probably going to be coupled with news...
  • This Week in Security News
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for...
  • Optimize Your Mac!
    Mac laptop and mini users often struggle to optimally use their computer’s memory or to keep their disk clean, since these Macs may be a bit tight on resources to begin with. Users can run out of memory when multiple memory-hogging apps are open, or they can run out of disk space (particularly on the...
  • Double Whammy: When One Attack Masks Another Attack
    Let's take a closer look at what happens when one attack masks another.
  • Trend Micro Protects VMware on Amazon Web Services
    Organizations are taking advantage of changes in computing technology to position themselves for a more agile future. Technology leaders and architects see value beyond the data center with new public cloud models and are keen on adopting hybrid infrastructure approaches to their compute environments. In August VMware...
  • Customer-driven Rapid Innovation for Hybrid Cloud Security
    Cyber threats have no boundaries; they come in new and evolving forms, capable of striking at any time … so it becomes important that your threat protection extends beyond conventional boundaries as well. In the past, on premise versions of security solutions were held up by long development cycles and significant...
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of November 13, 2017
    The dreaded white, blank screen in Microsoft Word is taunting me, with its blinking cursor asking for words to be written. Just when I thought I wouldn’t get any inspiration for this week’s blog, inspiration came to me from beyond through our late CTO Raimund Genes. Earlier this week, the third annual Trend Micro Capture...
  • This Week in Security News
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for...
  • Pursuing The Right to be Left Alone
    The three pillars of privacy, defined in “The Right to Privacy” (4 Harvard L.R. 193 (Dec 15, 1890)), are 1) the right to know what information is gathered about you, 2) the right to know how it will be used, and 3) the right to be left alone. The European Union has incorporated these principles...