Category Archives: Mobile Security

Going mainstream, going underground: the threats to watch out for in 2015

It’s that time of the year again, when cyber security experts are called upon to tell the world what we should all be afraid of over the coming 12 months. At Trend Micro, our threat researchers around the globe actively study the landscape for new tools, techniques and procedures used by the bad guys. This TrendLabs research team helps us design the next generation of products to keep our customers safe and keeps us at the leading edge of the cyber security industry. Continue reading

The Future Now: Why Firms Need to Get a Secure Grip on Wearables

by Raimund Genes

The use of wearable technology in the UK workplace is soaring, according to a new study we just published in conjunction with Vanson Bourne. Over two-thirds (69%) of enterprise IT leaders say staff bring wearables to work and 91% claim these numbers will increase over the coming year. But what about the privacy and corporate information security risks involved? Will wearables turn BYOD into an unmanageable security blackhole? And what additional security steps might be necessary to lock down risk in this area?

We held a roundtable discussion yesterday to find out. Continue reading

Predicting 2015: UK Braced for Targeted Attacks

by Raimund Genes

It’s that time of the year again – when security experts are called upon to take stock of the past 12 months and get their crystal balls out to predict the major industry trends for the coming year. Trend Micro always aims to be first to provide a comprehensive assessment of the threat landscape over the next 12 months and 2014 is no different. Continue reading

The Internet of Things: to Go Faster we Need Better Brakes

Internet of Everything There’s an old analogy often used by commentators when discussing cyber security-related matters. Brakes were invented not to slow down cars but to enable them to travel faster more safely, the story goes. In a similar way, information security should be designed into systems from the start not to impede but to enable them to be used to their full potential. Nowhere is this more appropriate than when we talk about the Internet of Things (IoT).
Continue reading