Enterprise Security News: Discover New Services and Capabilities at AWS re:Invent 2015

3 years ago
  • Html
  • Text
September 2015
View in web browser
Don't Miss Trend Micro at AWS re:Invent 2015
Stop by our booth #1004 to get the latest on Trend Micro's instant-on security for AWS deployments. And don't miss our breakout sessions:
Lessons from a CISO: Securely Scale Teams, Workloads, and Budgets
Defending Your Workloads Against the Next Zero Day
Get event details | Register for live event stream
Learn Why There's More to Security than Compliance
In a talk he delivered at CloudSec 2015, Rik Ferguson explains how dangerous it can be for enterprises to aim only at compliance, thinking that adequate security will be the natural result. Watch the video to learn why sometimes compliance is a "false horizon."
Watch now
Cybersecurity Under FTC Authority: What Does it Mean?
A US federal court recently granted the Federal Trade Commission authority to regulate cybersecurity. In this in-depth article, Tom Kellermann explains the context and consequences of this significant ruling—and what it means for you.
Read the article
The Broad Benefits of Connected Threat Defense
The analysts at Gartner have worked with Trend Micro to develop this invaluable report that explores why a connected threat defense strategy is the best way to protect networks—and includes a detailed buying guide for endpoint protection platforms.
Get the report
The Spy Kittens are Back: Rocket Kitten 2
Trend Micro threat analysts have collaborated with ClearSky to produce this in-depth report about the latest activities by threat actors known as Rocket Kitten Group, and primarily targeting Middle East organizations in various verticals.
Read the report
International Law Firm Secures Virtualized Infrastructure
Cooper Grace Ward, a leading international law firm, made the transition to a fully virtualized IT infrastructure to improve flexibility and efficiency. When it came to securing everything from data centers to virtual desktops, Trend Micro™ Deep Security™ was the ideal choice.
Get the full story
Security Can Make or Break Your Azure Project
Azure is a great platform for hosting a wide variety of enterprise workloads and projects. But if you try to secure your project with traditional security, you're going to lose a lot of the benefits. This blog by Chris Voice explains why—and how to do it right.
Read the blog
BANK INFO SECURITY: Target, Visa Reach Breach Settlement—Payout Reportedly
Capped at $67 Million
FORBES / TECH: 6 Observations About Cybersecurity Based On Two New Surveys
INC: Cyberattacks Cost Businesses $400 Billion a Year
Home  |  Blogs  |  For Business  |  Threat Research  |  Support  |  Sales Contact Me
Copyright © 2015 Trend Micro Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice.
Subscribe to Trend Micro newsletters

Share this newsletter on

Related newsletters

© 2019