Time flies fast in tech. When Trend Micro was founded nearly 30 years ago, mobile phones were pretty clunky, prohibitively expensive and not in the least bit “smart”. Fast forward to today and the device in your pocket has more compute power than the NASA machines that put man on the moon. Over the years, the annual Mobile World Congress (MWC) show in Barcelona has offered us a fascinating glimpse into the remarkable growth of this industry.
Mobile is now at the very heart of our digital world. It means much more today than smartphones — extending out into the Internet of Things (IoT) to permeate virtually every aspect of our lives. But with this newly connected, digital world come new risks. That’s why Trend Micro CEO Eva Chen was on hand at MWC this year, to explain to the press how her vision for connected intelligence can help build a safer connected world. Continue reading →
Bring Your Own Device (BYOD) has for the past few years been both a cause of sleepless nights for security bosses and a major flash point between the business and IT. To that we can now add wearable technology – smart watches, fitness trackers, head-mounted displays and the like which threaten to leak corporate data and expand the enterprise risk surface even further. IT consumerisation took another hit this month when new research revealed that some of the most popular apps in the world have password brute force vulnerabilities, exposing as many as 600 million Android and iOS users.
Of course, when it comes to BYOD and consumerisation, threats affecting personal devices can present major risks to corporate security too. This is why we regard consumerisation as one of the key pillars of cyber security strategy. Continue reading →
The Internet of Things promises to transform the way we live and work. Billions of smart, internet-connected devices will make us more productive, happier and even healthier. But there are risks. For enterprise IT managers and employees alike, there’s a real danger that the commercial pressure to release to market IoT products and platforms will override all other considerations, leading to major privacy and security gaps.
Those concerns are no longer theoretical as a new piece of research showed last week. It should provide serious food for thought for IoT players, end users and IT bosses. Continue reading →