Trend Micro and Synk have announced plans for a new, co-developed security solution for Open Source risks.
Continue readingTag: Trend Micro
8.8 million COVID-19 threats blocked in 1H 2020: report
Trend Micro blocked 8.8 million COVID-19 related threats in the first half of 2020, nearly 92% were email-based. Trend Micro said this in its annual mid-year roundup report.
Continue readingTrend Micro beefs up cloud security with AWS
Trend Micro has increased agility and automation in cloud security via integration with Amazon Web Services (AWS).
Continue readingTrend Micro XDR suite comes to APAC, MEA
Trend Micro XDR suite is officially available in Asia Pacific, Middle East, and Africa (MEA).
Continue readingTrend Micro Cloud One available to Azure users
Trend Micro Cloud One – Conformity offering is now available to Azure customers, helping global organisations tackle misconfigurations, compliance challenges and cyber-risks in the cloud.
Continue reading72% Remote workers gained cybersecurity awareness amid lockdown
A high level of security awareness prevails in India, the study found with 84% of respondents claimed that they take IT team instructions seriously.
Continue readingCybage Software 100 Linux servers under Deep Security
With Trend Micro Deep Security, Cybage Software has been able to prevent unauthorized software changes, and stop the execution of unknown and unwanted applications.
Continue readingUnconventional attack methods to weaken Industry 4.0: Trend Micro
Trend Micro has released research describing how advanced hackers could leverage unconventional, new attack vectors to sabotage smart manufacturing environments.
Continue readingTrend Micro’s new enhanced channel partner program for AMEA
Trend Micro has said that it is launching a newly expanded and enhanced channel partner program in Asia Pacific, Middle East, and Africa (AMEA).
Continue readingTrend Micro uses honeypot to trap malicious attackers
Trend Micro urges smart factory owners to minimize the number of ports they leave open and to tighten access control policies, among other cybersecurity best practices.
Continue reading