• February 15, 2013
    In terms of security, an enterprise is only as strong as his weakest employee. Uninformed, reckless, and disgruntled employees can be the unwitting cause of a targeted attack. Strict employee policies and education programs should be enterprise priorities.
  • February 15, 2013
    With threat actors relying on open-source information for their social engineering attacks, businesses will have to weigh in on what’s more important: securing their company or improving their online presence. Striking a balance between the two might prove tri
  • February 12, 2013
    Ninety-six percent of enterprises think they know what targeted attack campaigns are. But studies show that more than half can't even differentiate between traditional threats and actual attacks. How far is enterprise perception on their targeted attack pr
  • November 15, 2012
    Data Breach 101: What it is, how is it done, possible causes, and how should enterprises and consumers handle them.
  • November 05, 2012
    Targeted attack incidents from previous years prove that targeted campaigns don't always use the same attack methods. Diversifying defense measures such as log inspection, virtual patching, and the like can help minimize the risks they may face in 2013.
  • October 09, 2012
    Employees are the weakest link in enterprise security. Around 87%, in an experiment, exposed their organizations to a potential threat after clicking a malicious link. This makes all entry points, including everyday emails, critical risks when it comes to targ
  • August 28, 2012
    The ICS-CERT released a comprehensive review of its first 26 months in operation, revealing a sharp rise in the amount of reported cyberattacks in that time.
  • August 18, 2012
    The Taidoor campaign primarily targeted government organizations located in Taiwan. Trend Micro Research was able to develop indicators of compromise useful in determining if an attack is underway in an enterprise.
  • August 13, 2012
    Trend Micro cyber security vice president Tom Kellerman says organizations must change the way they think about security when dealing with targeted attacks. Their IT teams must always assume compromise and build their company’s strategies from there.