Local organisations are overwhelmingly confident in the security of their cloud providers but around half have doubts about their own ability to secure data, as is required under the Shared Responsibility Model for cloud. That is according to Trend Micro, which polled 2,565 decision makers in 28 countries for a
Cloud technologies exploded in popularity in 2020 as organisations scrambled to respond to migrating workers and customers. But the cloud tools and migrations are creating a host of migration and security headaches, according to Trend Micro which says many organisations are unaware of the best practices required. While public cloud
Smart home devices and their apps represent a major weak link in the corporate cybersecurity chain as the lines between work and home life increasingly blur, according to Trend Micro research released today. Trend Micro’s “Head in the Clouds” study surveyed more than 13,000 remote workers across 27 countries to
Australian cloud security, compliance, and governance company Cloud Conformity has been acquired by multinational cybersecurity firm Trend Micro for $US70 million. The Cloud Conformity solutions will be available through Trend Micro immediately, according to the company. Trend Micro says the deal will broaden its services to include security issues around
There is a global skills shortage in cybersecurity and one of the major factors is the lack of women in the industry, according to Myla Pilao, director technology market research, Trend Micro. During the Women in Tech panel at Trend Micro’s CloudSec event in Melbourne recently, Pilao said there is
The radio frequency remote controllers used for safety critical industrial applications are less secure than typical garage door remotes, according to a new report from Trend Micro. The cybersecurity firm tested leading vendors’ radio frequency (RF) remote controllers — the type typically used to control basic operations of cranes, drills
Smart metres and IoT have the potential to optimise performance and maintenance of the billions of dollars worth of infrastructure in Australian utilities. But each new device creates a potential access point to systems that are not designed with cyber security in mind and, in some cases, are already exposed.