Trend Micro

Trend Micro News

Cisco crashes the enterprise mobile party with new collaboration app

Project Squared will let users strike up ad hoc team meetings with audio, video conferencing, file sharing and text chat read more »

Bash malware targets embedded devices running BusyBox

Attackers use malware dubbed Bashlite to scan for and install backdoors on routers and other systems running BusyBox read more »

Adobe fixes eighteen vulnerabilities in Flash Player

Fifteen of them are critical and can result in remote code execution read more »

'Dridex' malware revives Microsoft Word macro attacks

Macro attacks fell out of favor years ago but are coming back, Trend Micro said read more »

IBM takes on enterprise cloud security

IBM's new Dynamic Cloud Security offers a set of services covering access control, data protection and increased visibility read more »

Microsoft leans on data-center strength to get cloud edge

The company tries to catch up to and surpass Amazon Web Services at TechEd Europe read more »

more news ..
Trend Micro Blogs

New ARM-based Moonshot servers from HP exemplify workload-specific computing

HP promises 35 percent cost savings for targeted workloads read more »

Intel's role in the future of software-defined infrastructure

Intel led the hardware standardisation revolution. It should do the same for software defined infrastructure read more »

The Forrester Wave: Enterprise Business Intelligence Platforms, Q4 2013

Making sense of a crowded market read more »

How to make sure you don't end up with a Snowden-sized security leak

Risky business outsourcing.... read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Trend Micro In Depth

The hacker 'skills gap' may be more of a strategy gap

It feels like the bad guys are winning read more »

iPhones chipping away at BlackBerry enterprise stronghold

iPhones will beat out BlackBerry devices in the enterprise this year, IDC says, thanks in part to the "Bring Your Own Device" trend - Or has it happened already? read more »

A balanced BYOD policy is better all round

Tying down the tablets read more »

BYOD to decline in 2013 as enterprise mobility grows?

BYOD cost savings and greater worker productivity are myths, says one researcher - BYOD will get a reality check in 2013 read more »

Power efficiency a growing concern in the data centre and for end users

Energy consumption is at the forefront of IT as industry leaders seek to lower costs and, for the more altruistically inclined, save the planet at the same time read more »

Microsoft SharePoint 2013 - How good is new office collaboration suite?

Microsoft takes up such major trends as cloud readiness, social collaboration and mobility with SharePoint 2013. The ultimate goal is a uniform user experience read more »

more in depth ..
Trend Micro Slideshows

Intel showcases the tech trends of tomorrow

Print your own robot and cars that understand what you say read more »

RSA 2013: Six security startups

These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf read more »

New security tools protect virtual machines

Product test reveals differences between Reflex, Catbird, Beyond Trust, Hytrust and Trend Micro read more »

Information technology: It's not just a guy thing

Nine women who found great careers in high tech read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open