• TOP
  • Top Rankings

Top Rankings

1 CEO Interview: Eva Chen Meets with ‘IIoT World’
2018/05/07

CEO Interview: Eva Chen Meets with ‘IIoT World’

Trend Micro CEO Eva Chen recently shared her insights on cybersecurity for industrial control systems (ICS) in an interview with IIoT World co-founder, Lucian Fogoros. IIoT World is the first global digital publication dedicated to the connected industry and Industrial Internet of Things (IIoT).

2 NTT DOCOMO Implements Trend Micro Smart Home Network™ on its newest Wi-Fi Router
2018/10/29

NTT DOCOMO Implements Trend Micro Smart Home Network™ on its newest Wi-Fi Router

Today’s homes are filled with connected devices that usually lack the protection more often found on PCs and smartphones. To counter this, NTT DOCOMO set out to create a router that could minimize the security risks of those devices. They chose Trend Micro Smart Home Network™ for their embedded network security solution.

3 Critical Infrastructures Exposed and at Risk: Energy and Water Industries
2018/11/01

Critical Infrastructures Exposed and at Risk: Energy and Water Industries

The harnessing of energy and water and their distribution to households, facilities, and entire cities is the incredible responsibility of critical sectors. Nowadays, infrastructures built to handle these processes operate with such efficiency that energy and water can run in the background of the daily bustle of human activity.This feat is achieved through the continuing development of technology surrounding such resources — development that now involves being “smart.”

4 Trend Micro and NTT DOCOMO Collaborate to Provide New Solution for 5G Era
2018/10/31

Trend Micro and NTT DOCOMO Collaborate to Provide New Solution for 5G Era

DALLAS--(BUSINESS WIRE)--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced a partnership with NTT DOCOMO to develop a new solution for the demands of the 5G era.

5 Richard Ku on Industrial IoT Security: Interview with Microsoft Channel 9
2018/07/26

Richard Ku on Industrial IoT Security: Interview with Microsoft Channel 9

According to Ku, “Thirty years ago people looked at security on the IT side as an afterthought and this is what’s happening on the OT side today”

6 Trend Micro Virtual Network Function Suite
2018/06/20

Trend Micro Virtual Network Function Suite

Learn how the Trend Micro Virtual Network Function Suite (VNFS) deals with IoT security concerns, especially with carrier NFV environments.

7 Block Threats to IP Cameras with Trend Micro IoT Security for Surveillance Cameras
2018/04/24

Block Threats to IP Cameras with Trend Micro IoT Security for Surveillance Cameras

IP (Internet Protocol) cameras have become a favorite target for hackers because of their relatively high computing power and low investment required to carry out attacks on them. Learn about typical attacks to IP cameras and the Trend Micro solutions.

8 Trend Micro Debunks Common Home Network Security Myths
2018/03/27

Trend Micro Debunks Common Home Network Security Myths

For most people, securing a home wireless network rarely involves more than choosing a unique password. This should come as no surprise: networking is not exactly simple technology. A home network can connect all sorts of devices (computers, tablets, mobile phones, gaming consoles, and appliances, to name just a few) so that they can communicate with each other and the internet.

9 Connected Vehicle Security Vulnerabilities
2018/03/21

Connected Vehicle Security Vulnerabilities

In the history of mandatory regulation of computerized vehicles, an E-Letter entitled, “Black box is not safe at all,” was published. It mentioned that on-board diagnostics (OBD-II) specifications were made mandatory for all cars sold in the United States in 1996. The European Union made European OBD (EOBD) mandatory for all gasoline (petrol) vehicles sold in the European Union starting in 2001.

10 Are Your Wearables Fit to Secure You? Researchers Outline 3 Attack Surfaces
2018/04/09

Are Your Wearables Fit to Secure You? Researchers Outline 3 Attack Surfaces

Every year, Black Hat Asia gathers security researchers and enthusiasts alike to demonstrate how technologies and applications can be improved. Last year, researchers delved into vulnerabilities and exploits that affected devices on the internet of things (IoT). This year is no different, as the conference has brought forth more hacks and concerns around the IoT. And one affected field in particular may be a little too close for comfort: wearables.

Recommended Video

IoT Devices as Jumping-off Points for Cybercrime: Trend Micro Security Predictions for 2018

Company Information

Security Blog
PageTop