Video Thumbnail: 2013 Threat Predictions Interview (Part 3): The Digital Lifestyle and the Digital Consumer

2013 Threat Predictions ...

In this third and final part of a series of videos from TrendLabs, Raimund Genes (CTO – Trend Micro) and Myla Pilao (Marketing Director – TrendLabs) discuss his insights on the growing complexity of managing multiple devices, platforms and accounts, as well as on “the Internet of things”. He also provides a single tip end-users should do for the coming year.
Video Thumbnail: 2013 Threat Predictions Interview (Part 2): Africa, Data Breaches, and Tips for Businesses

2013 Threat Predictions ...

Raimund Genes (CTO – Trend Micro) explains why Africa will be the next safe harbor for cybercriminals, how law enforcement will respond to cybercriminals in the coming years, and why data breaches and politically motivated attacks continue, if not become more destructive, in the second part of his interview with Myla Pilao (Marketing Director – TrendLabs) during his recent trip to TrendLabs.
Video Thumbnail: 2013 Threat Predictions Interview (Part 1): Top 3 Predictions

2013 Threat Predictions ...

Following his initial readout of his 2013 threat predictions, Raimund Genes (CTO – Trend Micro) sits down with Myla Pilao (Marketing Director – TrendLabs) to share his insights on the expanding divergence in users’ computing experience and to discuss in detail three important forecasts on the threat landscape, mobile platforms, and Windows 8.
Video Thumbnail: 2013 Threat Predictions

2013 Threat Predictions

Raimund gives his security and threat predictions for 2013
Video Thumbnail: Android under siege: Popularity comes at a price

Android under siege: Pop...

Everyone loves mobile apps, especially cybercriminals Raimund Genes (CTO – Trend Micro) discusses our key focus in the Q3 2012 threat roundup report, which is mobile threats. Listen to his insights into this part of the global threat landscape which has been picking up substantially this year. You can view the Q3 2012 threat round up here: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt-3q-2012-security-roundup-android-under-siege-popularity-comes-at-a-price.pdf
Video Thumbnail: Expanded Smart Protection Network

Expanded Smart Protectio...

Raimund talks about Trend’s use of big data within the Smart Protection Network and how it is delivering improved protection against today’s threats. Transcript: It seems that Big Data Analytics is the new Buzz Word, at least in IT Security Everybody claims to do big data processing. And actually, a valid claim. We at Trend Micro receive 430000 files everyday, we condense it down to 200000 unique files and generate 60000 new signatures – every day. Like all the other security players… But different to the others we started with e-mail reputation in 2005 to address the spam challenge – and we realized thanks to this that we have a goldmine, as unwanted e-mail is also used to spread malware and launch targeted attacks. By not only rejecting the SPAM for our customers but doing...
Video Thumbnail: Is Patch Tuesday a Necessary Evil?

Is Patch Tuesday a Neces...

In the last Patch Tuesday bulletin, Microsoft identified a critical flaw affecting Remote Desktop Protocol (RDP), included in most versions of Windows, and they estimate criminals will exploit it within 30 days. How long will it take you patch your critical systems and what is the cost to productivity? Is there a better way? **Update: this vulnerability is already being exploited. Patch now and check out the video for a better method to use next time. Transcript: [Patch Tuesday from Microsoft. I call it the necessary evil. Nobody’s shouting, Hooray another downtime. Ok some ends users might like the extra coffee break. This time on March 13 Microsoft issued a crucial alert for a new vulnerability in its remote desktop protocol across all of its servers and desktop systems. As a...
Video Thumbnail: Mobile App Reputation

Mobile App Reputation

Every week brings another news article about security concerns surrounding mobile apps. While it can be a challenge to separate truth from hype in these reports, there is no denying that the explosion in malware targeting mobile platforms means that downloading a new app always carries risk. With Trend Micro’s innovative new mobile app reputation technology, you can now make an informed decision about which apps are safe and reliable, protecting everything from your data to your smartphone battery. Look for this and other new technologies in the next generation of mobile protection from Trend Micro.
Video Thumbnail: 2012 Threat Predictions

2012 Threat Predictions

Listen to Raimund’s 12 predictions for how threats will change in 2012. He forecasts threats related to consumerization, mobile devices, application vulnerabilities, social networking, botnets and more. [Transcript: I want to talk about our threat predictions for 2012. So what is going on out there. Actually for 2012 we did 12 predictions because it somehow fits. And what is affecting the threat landscape. We see two big IT threats One is consumerization. More and more people bring their own devices into an organization. And data is stored onto these mobile devices, maybe replicated to a cloud so it is not clear where the data is anymore. It’s all a big cloud you could say , and the data’s on the move so their old traditional means of defense where you had fortress around...
Video Thumbnail: Vulnerability Shielding for Virtualized Servers

Vulnerability Shielding ...

Trend Micro’s agent-less antivirus solution for virtual machines attracts a lot of attention. But as customers learn more about our solutions for virtual environments, they are even more excited about the capability to protect against un-patched vulnerabilities. Transcript: [At VMworld in Las Vegas and in Copenhagen we had a lot of traffic towards our booth because we presented agentless AV. And we’re still the only company offering this so this was the big talk. Everyone wanted to know how we use the Hypervisor to protect all of the internal shields underneath without antivirus. But then when you talk with the prospect it’s actually interesting because Antivirus is needed but its not the top concern to protect the server. Antivirus on the server is mainly there so you...