simply-security-logo

 

10 December 2018

  • What Happens When Victims Pay Ransomware Attackers?

    For many hackers around the globe, ransomware infections have become a lucrative business. Although these types of malware samples have been around for years now, they continue to spur success – and high monetary profits – for attackers. In fact, according to a statement from U.S. Deputy Attorney General

    ...
  • This Week in Security News: Security and Privacy Issues

    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, understand how Trend Micro™ Deep Security™ service will be integrating with AWS Security Hub. Also, learn how to prevent risks and secure

    ...
  • Securing Smart Manufacturing with Connected Threat Defense

    By David Tay, the CIO of Beyonics You’d be hard pushed to find any organization today not involved in digital transformation projects. But the manufacturing sector was arguably one of the first to the game. Back in 2011, the German government first coined the term Industry 4.0 to describe the opportunities stemming

    ...
  • 30 Years of Trend Micro

    This year marks 30 years of Trend Micro. That’s three decades of working to make the world safe for exchanging digital information in a constantly changing technology and cyber threat environment. Our founders often reference the humble beginnings of the company – starting from a garage in California – to highlight

    ...
  • Parlez-vous Machine?

    Have you ever heard of the MQTT or CoAP protocols? No? Well the device on your wrist, and so many devices around you, could be using them right now. MQTT and CoAP are machine-to-machine or M2M protocols. With the rise of the internet of things (IoT) and operational technology (OT), there’s increased security focused

    ...
  • This Week in Security News: Ethics and Law in the Dark Web

    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.  This week, learn how Trend Micro software can aid in safely securing containers on the AWS Cloud. Also, how the dark web has become a new advertising medium

    ...
  • AWS Security Hub and Deep Security

    One of the biggest challenges in maintaining your security posture is visibility. You have security controls deployed throughout the stack, and each fo these tools is generating its own set of data points and has its own view of your deployment. Managing the multitude of alerts and events from these tools can quickly

    ...
  • Today’s Data Breach Environment: An Overview

    By now, companies and consumers alike are well aware of the threat of a data breach. Large and small businesses across every sector have been targeted, and many customers are now familiar with the notification that their username, password or other details might have been compromised. The unfortunate fact is that,

    ...
  • Securing Containers in The AWS Cloud with Trend Micro

    Rapid adoption of containers is changing the way that businesses build their applications. Services like Amazon ECS, Amazon EKS, and AWS Fargate let builders focus on solving business problems instead of managing infrastructure. But the move to containers also requires a shift in how you approach security. Dynamic

    ...
  • AWS Helping to Unlock Potentially Life-saving Innovation for the Healthcare Sector – While Keeping Sensitive Information Locked Down

    Marnie Wilking – CISO, VP Information Assurance, Orion Health Many of the next significant, potentially lifesaving discoveries that will happen in healthcare will be the direct result of big data, machine learning and artificial intelligence. Making the shift to big data, machine learning and artificial intelligence

    ...