際際滷shows by User: trendmicro / http://www.slideshare.net/images/logo.gif 際際滷shows by User: trendmicro / Mon, 08 Apr 2019 14:02:02 GMT 際際滷Share feed for 際際滷shows by User: trendmicro Industrial Remote Controllers Safety, Security, Vulnerabilities /slideshow/industrial-remote-controllers-safety-security-vulnerabilities/140032515 hmi2-190408140202
Presentation by Dr. Marco Balduzzi from Hannover Messe 2019. ]]>

Presentation by Dr. Marco Balduzzi from Hannover Messe 2019. ]]>
Mon, 08 Apr 2019 14:02:02 GMT /slideshow/industrial-remote-controllers-safety-security-vulnerabilities/140032515 trendmicro@slideshare.net(trendmicro) Industrial Remote Controllers Safety, Security, Vulnerabilities trendmicro Presentation by Dr. Marco Balduzzi from Hannover Messe 2019. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hmi2-190408140202-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation by Dr. Marco Balduzzi from Hannover Messe 2019.
Industrial Remote Controllers Safety, Security, Vulnerabilities from Trend Micro
]]>
3185 4 https://cdn.slidesharecdn.com/ss_thumbnails/hmi2-190408140202-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Investigating Web Defacement Campaigns at Large /slideshow/investigating-web-defacement-campaigns-at-large/103003574 investing-web-defacement-campaigns-at-large-180625175345
Website defacement is a very common attack. We know that hackers attack websites everyday. After websites are compromised, web pages could be altered by hackers. Hackers usually leave some messages in deface pages, like who they are, why they attack.]]>

Website defacement is a very common attack. We know that hackers attack websites everyday. After websites are compromised, web pages could be altered by hackers. Hackers usually leave some messages in deface pages, like who they are, why they attack.]]>
Mon, 25 Jun 2018 17:53:45 GMT /slideshow/investigating-web-defacement-campaigns-at-large/103003574 trendmicro@slideshare.net(trendmicro) Investigating Web Defacement Campaigns at Large trendmicro Website defacement is a very common attack. We know that hackers attack websites everyday. After websites are compromised, web pages could be altered by hackers. Hackers usually leave some messages in deface pages, like who they are, why they attack. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/investing-web-defacement-campaigns-at-large-180625175345-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Website defacement is a very common attack. We know that hackers attack websites everyday. After websites are compromised, web pages could be altered by hackers. Hackers usually leave some messages in deface pages, like who they are, why they attack.
Investigating Web Defacement Campaigns at Large from Trend Micro
]]>
4437 5 https://cdn.slidesharecdn.com/ss_thumbnails/investing-web-defacement-campaigns-at-large-180625175345-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Behind the scene of malware operators. Insights and countermeasures. CONFidence 2018, Kracow 05.06.2018 /slideshow/behind-the-scene-of-malware-operators-insights-and-countermeasures-confidence-2018-kracow-05062018/101135353 preso-180607143308
Modern cybercrime operates highly-sophisticated campaigns that challenge, or even evade, the state-of-art in defense and protection. On a daily basis, users worldwide are fooled by new techniques and threats that went under the radar, like new 0-days or attack vectors. We passively monitored how these attacks are conducted on real installations, and unveiled the modus operandi of malware operators. In this presentation, we share with the audience our recent findings and trends that we observed in-the-wild from the analysis we conducted on 3 million software downloads, involving hundreds of thousands of Internet connected machines. During the talk, we provide insights on our investigation like the effect of code signing abuse, the compromise of cloud providers' operations, the use of domains generated automatically via social engineering, and the business model behind modern malware campaigns. We also discuss the problem of "unknown threats", showing how the Internet's threats landscape is still largely unexplored and how it badly impacts on million of users. We conclude with a proof-of-concept system that we designed and that uses machine-learning to generate human-readable rules for detection. Our system represents a potential mitigation to the problem of "unknown threats" and an assistance tool for analysts globally.]]>

Modern cybercrime operates highly-sophisticated campaigns that challenge, or even evade, the state-of-art in defense and protection. On a daily basis, users worldwide are fooled by new techniques and threats that went under the radar, like new 0-days or attack vectors. We passively monitored how these attacks are conducted on real installations, and unveiled the modus operandi of malware operators. In this presentation, we share with the audience our recent findings and trends that we observed in-the-wild from the analysis we conducted on 3 million software downloads, involving hundreds of thousands of Internet connected machines. During the talk, we provide insights on our investigation like the effect of code signing abuse, the compromise of cloud providers' operations, the use of domains generated automatically via social engineering, and the business model behind modern malware campaigns. We also discuss the problem of "unknown threats", showing how the Internet's threats landscape is still largely unexplored and how it badly impacts on million of users. We conclude with a proof-of-concept system that we designed and that uses machine-learning to generate human-readable rules for detection. Our system represents a potential mitigation to the problem of "unknown threats" and an assistance tool for analysts globally.]]>
Thu, 07 Jun 2018 14:33:08 GMT /slideshow/behind-the-scene-of-malware-operators-insights-and-countermeasures-confidence-2018-kracow-05062018/101135353 trendmicro@slideshare.net(trendmicro) Behind the scene of malware operators. Insights and countermeasures. CONFidence 2018, Kracow 05.06.2018 trendmicro Modern cybercrime operates highly-sophisticated campaigns that challenge, or even evade, the state-of-art in defense and protection. On a daily basis, users worldwide are fooled by new techniques and threats that went under the radar, like new 0-days or attack vectors. We passively monitored how these attacks are conducted on real installations, and unveiled the modus operandi of malware operators. In this presentation, we share with the audience our recent findings and trends that we observed in-the-wild from the analysis we conducted on 3 million software downloads, involving hundreds of thousands of Internet connected machines. During the talk, we provide insights on our investigation like the effect of code signing abuse, the compromise of cloud providers' operations, the use of domains generated automatically via social engineering, and the business model behind modern malware campaigns. We also discuss the problem of "unknown threats", showing how the Internet's threats landscape is still largely unexplored and how it badly impacts on million of users. We conclude with a proof-of-concept system that we designed and that uses machine-learning to generate human-readable rules for detection. Our system represents a potential mitigation to the problem of "unknown threats" and an assistance tool for analysts globally. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/preso-180607143308-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Modern cybercrime operates highly-sophisticated campaigns that challenge, or even evade, the state-of-art in defense and protection. On a daily basis, users worldwide are fooled by new techniques and threats that went under the radar, like new 0-days or attack vectors. We passively monitored how these attacks are conducted on real installations, and unveiled the modus operandi of malware operators. In this presentation, we share with the audience our recent findings and trends that we observed in-the-wild from the analysis we conducted on 3 million software downloads, involving hundreds of thousands of Internet connected machines. During the talk, we provide insights on our investigation like the effect of code signing abuse, the compromise of cloud providers&#39; operations, the use of domains generated automatically via social engineering, and the business model behind modern malware campaigns. We also discuss the problem of &quot;unknown threats&quot;, showing how the Internet&#39;s threats landscape is still largely unexplored and how it badly impacts on million of users. We conclude with a proof-of-concept system that we designed and that uses machine-learning to generate human-readable rules for detection. Our system represents a potential mitigation to the problem of &quot;unknown threats&quot; and an assistance tool for analysts globally.
Behind the scene of malware operators. Insights and countermeasures. CONFidence 2018, Kracow 05.06.2018 from Trend Micro
]]>
2769 4 https://cdn.slidesharecdn.com/ss_thumbnails/preso-180607143308-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security /slideshow/automated-security-for-the-realtime-enterprise-with-vmware-nsx-and-trend-micro-deep-security/79524951 sai3313busformattedfinalv6-170907132844
In todays real-time enterprise where we all must do more with less, the operations team is sometimes forced to take shortcuts. Forgetting to manually apply security controls is often one of the first tasks to fall by the wayside. VMs that are put in production, lacking adequate protection, leave high-risk vulnerabilities open for exploitation. Learn how building-in security automation with VMware NSX and Trend Micro Deep Security provides visibility, assesses risk, and applies the right protection. Once in operation, using the adapter for vRealize Operations, the security events become visible next to the operational events, providing a holistic view of the environment. This will be illustrated through the case study of a leading manufacturing company, Plexus Corporation, who will also share their NSX journey. This was one of Trend Micro's sessions presented at VMworld 2017.]]>

In todays real-time enterprise where we all must do more with less, the operations team is sometimes forced to take shortcuts. Forgetting to manually apply security controls is often one of the first tasks to fall by the wayside. VMs that are put in production, lacking adequate protection, leave high-risk vulnerabilities open for exploitation. Learn how building-in security automation with VMware NSX and Trend Micro Deep Security provides visibility, assesses risk, and applies the right protection. Once in operation, using the adapter for vRealize Operations, the security events become visible next to the operational events, providing a holistic view of the environment. This will be illustrated through the case study of a leading manufacturing company, Plexus Corporation, who will also share their NSX journey. This was one of Trend Micro's sessions presented at VMworld 2017.]]>
Thu, 07 Sep 2017 13:28:44 GMT /slideshow/automated-security-for-the-realtime-enterprise-with-vmware-nsx-and-trend-micro-deep-security/79524951 trendmicro@slideshare.net(trendmicro) Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security trendmicro In todays real-time enterprise where we all must do more with less, the operations team is sometimes forced to take shortcuts. Forgetting to manually apply security controls is often one of the first tasks to fall by the wayside. VMs that are put in production, lacking adequate protection, leave high-risk vulnerabilities open for exploitation. Learn how building-in security automation with VMware NSX and Trend Micro Deep Security provides visibility, assesses risk, and applies the right protection. Once in operation, using the adapter for vRealize Operations, the security events become visible next to the operational events, providing a holistic view of the environment. This will be illustrated through the case study of a leading manufacturing company, Plexus Corporation, who will also share their NSX journey. This was one of Trend Micro's sessions presented at VMworld 2017. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sai3313busformattedfinalv6-170907132844-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In todays real-time enterprise where we all must do more with less, the operations team is sometimes forced to take shortcuts. Forgetting to manually apply security controls is often one of the first tasks to fall by the wayside. VMs that are put in production, lacking adequate protection, leave high-risk vulnerabilities open for exploitation. Learn how building-in security automation with VMware NSX and Trend Micro Deep Security provides visibility, assesses risk, and applies the right protection. Once in operation, using the adapter for vRealize Operations, the security events become visible next to the operational events, providing a holistic view of the environment. This will be illustrated through the case study of a leading manufacturing company, Plexus Corporation, who will also share their NSX journey. This was one of Trend Micro&#39;s sessions presented at VMworld 2017.
Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security from Trend Micro
]]>
4192 11 https://cdn.slidesharecdn.com/ss_thumbnails/sai3313busformattedfinalv6-170907132844-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Skip the Security Slow Lane with VMware Cloud on AWS /slideshow/skip-the-security-slow-lane-with-vmware-cloud-on-aws/79524756 sai3316busformattedv3-170907132207
While migrating your infrastructure to the cloud offers an opportunity to rethink your approach to management and security, it can create a patchwork of processes and tools, a disorganized team, and duplication of work. In a few years, you may learn that the IT security team needs a unified approach to data protection and you must already overhaul your new setup. You thought you were speeding ahead with improved operations and lower costs, but you are actually in the security slow lane! Pull over and find a new route forward with VMWare on AWS by leveraging tools you know in an environment you already understand. Save years of work by utilizing a common set of tools, operational processes, and security framework when moving to the cloud. Learn tips and tactics from Trend Micro and Capgemini for setting your teams up for success nowand tomorrow. This was one of Trend Micro's sessions presented at VMworld 2017.]]>

While migrating your infrastructure to the cloud offers an opportunity to rethink your approach to management and security, it can create a patchwork of processes and tools, a disorganized team, and duplication of work. In a few years, you may learn that the IT security team needs a unified approach to data protection and you must already overhaul your new setup. You thought you were speeding ahead with improved operations and lower costs, but you are actually in the security slow lane! Pull over and find a new route forward with VMWare on AWS by leveraging tools you know in an environment you already understand. Save years of work by utilizing a common set of tools, operational processes, and security framework when moving to the cloud. Learn tips and tactics from Trend Micro and Capgemini for setting your teams up for success nowand tomorrow. This was one of Trend Micro's sessions presented at VMworld 2017.]]>
Thu, 07 Sep 2017 13:22:07 GMT /slideshow/skip-the-security-slow-lane-with-vmware-cloud-on-aws/79524756 trendmicro@slideshare.net(trendmicro) Skip the Security Slow Lane with VMware Cloud on AWS trendmicro While migrating your infrastructure to the cloud offers an opportunity to rethink your approach to management and security, it can create a patchwork of processes and tools, a disorganized team, and duplication of work. In a few years, you may learn that the IT security team needs a unified approach to data protection and you must already overhaul your new setup. You thought you were speeding ahead with improved operations and lower costs, but you are actually in the security slow lane! Pull over and find a new route forward with VMWare on AWS by leveraging tools you know in an environment you already understand. Save years of work by utilizing a common set of tools, operational processes, and security framework when moving to the cloud. Learn tips and tactics from Trend Micro and Capgemini for setting your teams up for success nowand tomorrow. This was one of Trend Micro's sessions presented at VMworld 2017. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sai3316busformattedv3-170907132207-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> While migrating your infrastructure to the cloud offers an opportunity to rethink your approach to management and security, it can create a patchwork of processes and tools, a disorganized team, and duplication of work. In a few years, you may learn that the IT security team needs a unified approach to data protection and you must already overhaul your new setup. You thought you were speeding ahead with improved operations and lower costs, but you are actually in the security slow lane! Pull over and find a new route forward with VMWare on AWS by leveraging tools you know in an environment you already understand. Save years of work by utilizing a common set of tools, operational processes, and security framework when moving to the cloud. Learn tips and tactics from Trend Micro and Capgemini for setting your teams up for success nowand tomorrow. This was one of Trend Micro&#39;s sessions presented at VMworld 2017.
Skip the Security Slow Lane with VMware Cloud on AWS from Trend Micro
]]>
1880 7 https://cdn.slidesharecdn.com/ss_thumbnails/sai3316busformattedv3-170907132207-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr. /slideshow/dark-web-impact-on-hidden-services-in-the-torbased-criminal-ecosystem-dr/76255933 marcobalduzzi-170523135819
In this work we explored the Attacks Landscape in the Dark Web. While in the past FTR looked at good and services offered and traded, here we investigated on the attacks and exposure. We observed hacking groups targeting each other, for example by defacing concurrent web sites in order to promote their -- or stealing Onion's private keys to possibly tampering on encrypted traffic in Tor.]]>

In this work we explored the Attacks Landscape in the Dark Web. While in the past FTR looked at good and services offered and traded, here we investigated on the attacks and exposure. We observed hacking groups targeting each other, for example by defacing concurrent web sites in order to promote their -- or stealing Onion's private keys to possibly tampering on encrypted traffic in Tor.]]>
Tue, 23 May 2017 13:58:18 GMT /slideshow/dark-web-impact-on-hidden-services-in-the-torbased-criminal-ecosystem-dr/76255933 trendmicro@slideshare.net(trendmicro) Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr. trendmicro In this work we explored the Attacks Landscape in the Dark Web. While in the past FTR looked at good and services offered and traded, here we investigated on the attacks and exposure. We observed hacking groups targeting each other, for example by defacing concurrent web sites in order to promote their -- or stealing Onion's private keys to possibly tampering on encrypted traffic in Tor. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/marcobalduzzi-170523135819-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this work we explored the Attacks Landscape in the Dark Web. While in the past FTR looked at good and services offered and traded, here we investigated on the attacks and exposure. We observed hacking groups targeting each other, for example by defacing concurrent web sites in order to promote their -- or stealing Onion&#39;s private keys to possibly tampering on encrypted traffic in Tor.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr. from Trend Micro
]]>
26156 6 https://cdn.slidesharecdn.com/ss_thumbnails/marcobalduzzi-170523135819-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Mobile Telephony Threats in Asia /slideshow/mobile-telephony-threats-in-asia/74099153 asia-17-balduzzi-mobile-telephony-threats-in-asia-170331201204
Trend Micro's Dr. Marco Balduzzi presents mobile telephony threats in Asia at Black Hat Asia 2017.]]>

Trend Micro's Dr. Marco Balduzzi presents mobile telephony threats in Asia at Black Hat Asia 2017.]]>
Fri, 31 Mar 2017 20:12:04 GMT /slideshow/mobile-telephony-threats-in-asia/74099153 trendmicro@slideshare.net(trendmicro) Mobile Telephony Threats in Asia trendmicro Trend Micro's Dr. Marco Balduzzi presents mobile telephony threats in Asia at Black Hat Asia 2017. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/asia-17-balduzzi-mobile-telephony-threats-in-asia-170331201204-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Trend Micro&#39;s Dr. Marco Balduzzi presents mobile telephony threats in Asia at Black Hat Asia 2017.
Mobile Telephony Threats in Asia from Trend Micro
]]>
6065 6 https://cdn.slidesharecdn.com/ss_thumbnails/asia-17-balduzzi-mobile-telephony-threats-in-asia-170331201204-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Cybercrime In The Deep Web /slideshow/cybercrime-in-the-deep-web/55211027 bheu2015-deepweb-151117152028-lva1-app6891
All content not indexed by traditional web-based search engines is known as the DeepWeb. Wrongly been associated only with the Onion Routing (TOR), the DeepWeb's ecosystem comprises a number of other anonymous and decentralized networks. The Invisible Internet Project (I2P), FreeNET, and Alternative Domain Names (like Name.Space and OpenNic) are examples of networks leveraged by bad actors to host malware, high-resilient botnets, underground forums and bitcoin-based cashout systems (e.g., for cryptolockers). We designed and implemented a prototype system called DeWA for the automated collection and analysis of the DeepWeb, with the goal of quickly identifying new threats as soon they appear. In this talk, we provide concrete examples of how using DeWA to detect, e.g., trading of illicit and counterfeit goods, underground forums, privacy leaks, hidden dropzones, malware hosting and TOR-based botnets.]]>

All content not indexed by traditional web-based search engines is known as the DeepWeb. Wrongly been associated only with the Onion Routing (TOR), the DeepWeb's ecosystem comprises a number of other anonymous and decentralized networks. The Invisible Internet Project (I2P), FreeNET, and Alternative Domain Names (like Name.Space and OpenNic) are examples of networks leveraged by bad actors to host malware, high-resilient botnets, underground forums and bitcoin-based cashout systems (e.g., for cryptolockers). We designed and implemented a prototype system called DeWA for the automated collection and analysis of the DeepWeb, with the goal of quickly identifying new threats as soon they appear. In this talk, we provide concrete examples of how using DeWA to detect, e.g., trading of illicit and counterfeit goods, underground forums, privacy leaks, hidden dropzones, malware hosting and TOR-based botnets.]]>
Tue, 17 Nov 2015 15:20:27 GMT /slideshow/cybercrime-in-the-deep-web/55211027 trendmicro@slideshare.net(trendmicro) Cybercrime In The Deep Web trendmicro All content not indexed by traditional web-based search engines is known as the DeepWeb. Wrongly been associated only with the Onion Routing (TOR), the DeepWeb's ecosystem comprises a number of other anonymous and decentralized networks. The Invisible Internet Project (I2P), FreeNET, and Alternative Domain Names (like Name.Space and OpenNic) are examples of networks leveraged by bad actors to host malware, high-resilient botnets, underground forums and bitcoin-based cashout systems (e.g., for cryptolockers). We designed and implemented a prototype system called DeWA for the automated collection and analysis of the DeepWeb, with the goal of quickly identifying new threats as soon they appear. In this talk, we provide concrete examples of how using DeWA to detect, e.g., trading of illicit and counterfeit goods, underground forums, privacy leaks, hidden dropzones, malware hosting and TOR-based botnets. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bheu2015-deepweb-151117152028-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> All content not indexed by traditional web-based search engines is known as the DeepWeb. Wrongly been associated only with the Onion Routing (TOR), the DeepWeb&#39;s ecosystem comprises a number of other anonymous and decentralized networks. The Invisible Internet Project (I2P), FreeNET, and Alternative Domain Names (like Name.Space and OpenNic) are examples of networks leveraged by bad actors to host malware, high-resilient botnets, underground forums and bitcoin-based cashout systems (e.g., for cryptolockers). We designed and implemented a prototype system called DeWA for the automated collection and analysis of the DeepWeb, with the goal of quickly identifying new threats as soon they appear. In this talk, we provide concrete examples of how using DeWA to detect, e.g., trading of illicit and counterfeit goods, underground forums, privacy leaks, hidden dropzones, malware hosting and TOR-based botnets.
Cybercrime In The Deep Web from Trend Micro
]]>
4487 11 https://cdn.slidesharecdn.com/ss_thumbnails/bheu2015-deepweb-151117152028-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014) /slideshow/hitb-ams/35434988 hitbams-140603095057-phpapp01
AIS, Automatic Identification System, is a promoted standard and implementation for vessels traffic safety and monitoring. With more than 400,000 installations worldwide, AIS is currently a mandatory installation for commercial vessels and a de-facto equipment for leisure crafts. AIS is largely used in ports worldwide -- Rotterdam alone monitors over 700 AIS-enabled vessels each day, serving 32,000 seagoing and 87,000 inland vessels a year. Back in October 2013, during HITB KUL, we showed that AIS is hardly broken, both at implementation and protocol level, and it suffers from severe vulnerabilities like spoofing and man-in-the-middle. In this talk, we extend our research by sharing with the audience several novel attacks that we recently discovered, for example how to extensively disable AIS communications or attack the software installed at back-end by port authorities. By doing so, we hope to raise the necessary awareness and lead the involved parties into calling for a more robust and secure AIS.]]>

AIS, Automatic Identification System, is a promoted standard and implementation for vessels traffic safety and monitoring. With more than 400,000 installations worldwide, AIS is currently a mandatory installation for commercial vessels and a de-facto equipment for leisure crafts. AIS is largely used in ports worldwide -- Rotterdam alone monitors over 700 AIS-enabled vessels each day, serving 32,000 seagoing and 87,000 inland vessels a year. Back in October 2013, during HITB KUL, we showed that AIS is hardly broken, both at implementation and protocol level, and it suffers from severe vulnerabilities like spoofing and man-in-the-middle. In this talk, we extend our research by sharing with the audience several novel attacks that we recently discovered, for example how to extensively disable AIS communications or attack the software installed at back-end by port authorities. By doing so, we hope to raise the necessary awareness and lead the involved parties into calling for a more robust and secure AIS.]]>
Tue, 03 Jun 2014 09:50:57 GMT /slideshow/hitb-ams/35434988 trendmicro@slideshare.net(trendmicro) AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014) trendmicro AIS, Automatic Identification System, is a promoted standard and implementation for vessels traffic safety and monitoring. With more than 400,000 installations worldwide, AIS is currently a mandatory installation for commercial vessels and a de-facto equipment for leisure crafts. AIS is largely used in ports worldwide -- Rotterdam alone monitors over 700 AIS-enabled vessels each day, serving 32,000 seagoing and 87,000 inland vessels a year. Back in October 2013, during HITB KUL, we showed that AIS is hardly broken, both at implementation and protocol level, and it suffers from severe vulnerabilities like spoofing and man-in-the-middle. In this talk, we extend our research by sharing with the audience several novel attacks that we recently discovered, for example how to extensively disable AIS communications or attack the software installed at back-end by port authorities. By doing so, we hope to raise the necessary awareness and lead the involved parties into calling for a more robust and secure AIS. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hitbams-140603095057-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> AIS, Automatic Identification System, is a promoted standard and implementation for vessels traffic safety and monitoring. With more than 400,000 installations worldwide, AIS is currently a mandatory installation for commercial vessels and a de-facto equipment for leisure crafts. AIS is largely used in ports worldwide -- Rotterdam alone monitors over 700 AIS-enabled vessels each day, serving 32,000 seagoing and 87,000 inland vessels a year. Back in October 2013, during HITB KUL, we showed that AIS is hardly broken, both at implementation and protocol level, and it suffers from severe vulnerabilities like spoofing and man-in-the-middle. In this talk, we extend our research by sharing with the audience several novel attacks that we recently discovered, for example how to extensively disable AIS communications or attack the software installed at back-end by port authorities. By doing so, we hope to raise the necessary awareness and lead the involved parties into calling for a more robust and secure AIS.
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014) from Trend Micro
]]>
3328 7 https://cdn.slidesharecdn.com/ss_thumbnails/hitbams-140603095057-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
HBR APT framework /slideshow/hbr-apt-framework/34960585 hbraptframework-140521112941-phpapp02
Harvard Business Review - Find out why 80% of executives interviewed were concerned about targeted attacks and what you can do to prevent it.]]>

Harvard Business Review - Find out why 80% of executives interviewed were concerned about targeted attacks and what you can do to prevent it.]]>
Wed, 21 May 2014 11:29:41 GMT /slideshow/hbr-apt-framework/34960585 trendmicro@slideshare.net(trendmicro) HBR APT framework trendmicro Harvard Business Review - Find out why 80% of executives interviewed were concerned about targeted attacks and what you can do to prevent it. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hbraptframework-140521112941-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Harvard Business Review - Find out why 80% of executives interviewed were concerned about targeted attacks and what you can do to prevent it.
HBR APT framework from Trend Micro
]]>
1053 5 https://cdn.slidesharecdn.com/ss_thumbnails/hbraptframework-140521112941-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Captain, Where Is Your Ship Compromising Vessel Tracking Systems /slideshow/captain-where-is-your-ship-compromising-vessel-tracking-systems/27232581 hitbkulwithvideosincluded-131015224641-phpapp02
A talk given by Kyle Wilhoit and Marco Balduzzi from Trend Micro's Forward Looking Threat Research team, along with independent researcher Alessandro Pasta. Abstract: In recent years, automated identification systems (AISes) have been introduced to enhance vessels tracking and provide extra safety to marine traffic, on top of conventional radar installations. AIS, which is currently a mandatory installation for all passenger ships and ships over 300 metric tonnes, works by acquiring GPS coordinates and exchanging vessels position, course and information with nearby ships, offshore installation, i.e. harbors and traffic controls, and Internet tracking and visualizing providers. With an estimated number of 400,000 installation, AIS is currently the best system for collision avoidance, maritime security, aids to navigation and accident investigations. Given its primary importance in marine traffic safety, we conducted a comprehensive security evaluation of AIS, by tackling it from both a software and a hardware, radio frequency perspective. In this talk, we share with you our finding, i.e how we have been able to hijack and perform man-in-the-middle attacks on existing vessels, take over AIS communications, tamper with the major online tracking providers and eventually fake our own yacht!.]]>

A talk given by Kyle Wilhoit and Marco Balduzzi from Trend Micro's Forward Looking Threat Research team, along with independent researcher Alessandro Pasta. Abstract: In recent years, automated identification systems (AISes) have been introduced to enhance vessels tracking and provide extra safety to marine traffic, on top of conventional radar installations. AIS, which is currently a mandatory installation for all passenger ships and ships over 300 metric tonnes, works by acquiring GPS coordinates and exchanging vessels position, course and information with nearby ships, offshore installation, i.e. harbors and traffic controls, and Internet tracking and visualizing providers. With an estimated number of 400,000 installation, AIS is currently the best system for collision avoidance, maritime security, aids to navigation and accident investigations. Given its primary importance in marine traffic safety, we conducted a comprehensive security evaluation of AIS, by tackling it from both a software and a hardware, radio frequency perspective. In this talk, we share with you our finding, i.e how we have been able to hijack and perform man-in-the-middle attacks on existing vessels, take over AIS communications, tamper with the major online tracking providers and eventually fake our own yacht!.]]>
Tue, 15 Oct 2013 22:46:41 GMT /slideshow/captain-where-is-your-ship-compromising-vessel-tracking-systems/27232581 trendmicro@slideshare.net(trendmicro) Captain, Where Is Your Ship Compromising Vessel Tracking Systems trendmicro A talk given by Kyle Wilhoit and Marco Balduzzi from Trend Micro's Forward Looking Threat Research team, along with independent researcher Alessandro Pasta. Abstract: In recent years, automated identification systems (AISes) have been introduced to enhance vessels tracking and provide extra safety to marine traffic, on top of conventional radar installations. AIS, which is currently a mandatory installation for all passenger ships and ships over 300 metric tonnes, works by acquiring GPS coordinates and exchanging vessels position, course and information with nearby ships, offshore installation, i.e. harbors and traffic controls, and Internet tracking and visualizing providers. With an estimated number of 400,000 installation, AIS is currently the best system for collision avoidance, maritime security, aids to navigation and accident investigations. Given its primary importance in marine traffic safety, we conducted a comprehensive security evaluation of AIS, by tackling it from both a software and a hardware, radio frequency perspective. In this talk, we share with you our finding, i.e how we have been able to hijack and perform man-in-the-middle attacks on existing vessels, take over AIS communications, tamper with the major online tracking providers and eventually fake our own yacht!. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hitbkulwithvideosincluded-131015224641-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A talk given by Kyle Wilhoit and Marco Balduzzi from Trend Micro&#39;s Forward Looking Threat Research team, along with independent researcher Alessandro Pasta. Abstract: In recent years, automated identification systems (AISes) have been introduced to enhance vessels tracking and provide extra safety to marine traffic, on top of conventional radar installations. AIS, which is currently a mandatory installation for all passenger ships and ships over 300 metric tonnes, works by acquiring GPS coordinates and exchanging vessels position, course and information with nearby ships, offshore installation, i.e. harbors and traffic controls, and Internet tracking and visualizing providers. With an estimated number of 400,000 installation, AIS is currently the best system for collision avoidance, maritime security, aids to navigation and accident investigations. Given its primary importance in marine traffic safety, we conducted a comprehensive security evaluation of AIS, by tackling it from both a software and a hardware, radio frequency perspective. In this talk, we share with you our finding, i.e how we have been able to hijack and perform man-in-the-middle attacks on existing vessels, take over AIS communications, tamper with the major online tracking providers and eventually fake our own yacht!.
Captain, Where Is Your Ship Compromising Vessel Tracking Systems from Trend Micro
]]>
26364 10 https://cdn.slidesharecdn.com/ss_thumbnails/hitbkulwithvideosincluded-131015224641-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Countering the Advanced Persistent Threat Challenge with Deep Discovery /slideshow/countering-the-advanced-persistent-threat-challenge-with-deep-discovery/21841825 countering-the-advanced-persistent-threat-challenge-with-deep-discovery3085-130524110020-phpapp01
Targeted attacks and advanced persistent threats (APTs) are becoming the new norm of cyber security threats encompassing organized, focused efforts that are custom-created to penetrate enterprises and government agencies for valuable data, trade secrets, and access to internal systems. We explore the anatomy of targeted attacks: the inner workings of the APT lifecycle, along with an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks.]]>

Targeted attacks and advanced persistent threats (APTs) are becoming the new norm of cyber security threats encompassing organized, focused efforts that are custom-created to penetrate enterprises and government agencies for valuable data, trade secrets, and access to internal systems. We explore the anatomy of targeted attacks: the inner workings of the APT lifecycle, along with an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks.]]>
Fri, 24 May 2013 11:00:18 GMT /slideshow/countering-the-advanced-persistent-threat-challenge-with-deep-discovery/21841825 trendmicro@slideshare.net(trendmicro) Countering the Advanced Persistent Threat Challenge with Deep Discovery trendmicro Targeted attacks and advanced persistent threats (APTs) are becoming the new norm of cyber security threats encompassing organized, focused efforts that are custom-created to penetrate enterprises and government agencies for valuable data, trade secrets, and access to internal systems. We explore the anatomy of targeted attacks: the inner workings of the APT lifecycle, along with an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/countering-the-advanced-persistent-threat-challenge-with-deep-discovery3085-130524110020-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Targeted attacks and advanced persistent threats (APTs) are becoming the new norm of cyber security threats encompassing organized, focused efforts that are custom-created to penetrate enterprises and government agencies for valuable data, trade secrets, and access to internal systems. We explore the anatomy of targeted attacks: the inner workings of the APT lifecycle, along with an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks.
Countering the Advanced Persistent Threat Challenge with Deep Discovery from Trend Micro
]]>
1924 7 https://cdn.slidesharecdn.com/ss_thumbnails/countering-the-advanced-persistent-threat-challenge-with-deep-discovery3085-130524110020-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
The Custom Defense Against Targeted Attacks /trendmicro/the-custom-defense-against-targeted-attacks the-custom-defense-against-targeted-attacks4697-130524104512-phpapp02
Advanced persistent threats (APTs) and targeted attacks have a proven ability to penetrate standard security defenses and remain undetected for months while siphoning valuable data or carrying out destructive actions. We review challenges faced by information security leaders, their options for dealing with attackers and how to a Custom Defense approach to deploy a comprehensive DetectAnalyzeAdaptRespond lifecycle that enhances current security investments while providing new weapons to fight back against their attackers.]]>

Advanced persistent threats (APTs) and targeted attacks have a proven ability to penetrate standard security defenses and remain undetected for months while siphoning valuable data or carrying out destructive actions. We review challenges faced by information security leaders, their options for dealing with attackers and how to a Custom Defense approach to deploy a comprehensive DetectAnalyzeAdaptRespond lifecycle that enhances current security investments while providing new weapons to fight back against their attackers.]]>
Fri, 24 May 2013 10:45:10 GMT /trendmicro/the-custom-defense-against-targeted-attacks trendmicro@slideshare.net(trendmicro) The Custom Defense Against Targeted Attacks trendmicro Advanced persistent threats (APTs) and targeted attacks have a proven ability to penetrate standard security defenses and remain undetected for months while siphoning valuable data or carrying out destructive actions. We review challenges faced by information security leaders, their options for dealing with attackers and how to a Custom Defense approach to deploy a comprehensive DetectAnalyzeAdaptRespond lifecycle that enhances current security investments while providing new weapons to fight back against their attackers. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/the-custom-defense-against-targeted-attacks4697-130524104512-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Advanced persistent threats (APTs) and targeted attacks have a proven ability to penetrate standard security defenses and remain undetected for months while siphoning valuable data or carrying out destructive actions. We review challenges faced by information security leaders, their options for dealing with attackers and how to a Custom Defense approach to deploy a comprehensive DetectAnalyzeAdaptRespond lifecycle that enhances current security investments while providing new weapons to fight back against their attackers.
The Custom Defense Against Targeted Attacks from Trend Micro
]]>
1031 6 https://cdn.slidesharecdn.com/ss_thumbnails/the-custom-defense-against-targeted-attacks4697-130524104512-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Where to Store the Cloud Encryption Keys - InterOp 2012 /trendmicro/where-to-store-the-cloud-encryption-keys-interop-2012 where-to-store-the-cloud-encryption-keys-interop-20123602-121030175617-phpapp02
Dave Asprey's presentation on "Where to Store the Cloud Encryption Keys" from InterOp 2012.]]>

Dave Asprey's presentation on "Where to Store the Cloud Encryption Keys" from InterOp 2012.]]>
Tue, 30 Oct 2012 17:40:47 GMT /trendmicro/where-to-store-the-cloud-encryption-keys-interop-2012 trendmicro@slideshare.net(trendmicro) Where to Store the Cloud Encryption Keys - InterOp 2012 trendmicro Dave Asprey's presentation on "Where to Store the Cloud Encryption Keys" from InterOp 2012. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/where-to-store-the-cloud-encryption-keys-interop-20123602-121030175617-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Dave Asprey&#39;s presentation on &quot;Where to Store the Cloud Encryption Keys&quot; from InterOp 2012.
Where to Store the Cloud Encryption Keys - InterOp 2012 from Trend Micro
]]>
1191 2 https://cdn.slidesharecdn.com/ss_thumbnails/where-to-store-the-cloud-encryption-keys-interop-20123602-121030175617-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
[Case Study ~ 2011] Baptist Hospitals of Southest Texas /slideshow/case-study-baptist-hospitals-of-southest-texas/9514661 casestudybaptisthospitalsofsouthesttexas-111002205859-phpapp02
Healthcare System Switches to Agentless Trend Micro VDI Security]]>

Healthcare System Switches to Agentless Trend Micro VDI Security]]>
Sun, 02 Oct 2011 20:58:57 GMT /slideshow/case-study-baptist-hospitals-of-southest-texas/9514661 trendmicro@slideshare.net(trendmicro) [Case Study ~ 2011] Baptist Hospitals of Southest Texas trendmicro Healthcare System Switches to Agentless Trend Micro VDI Security <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/casestudybaptisthospitalsofsouthesttexas-111002205859-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Healthcare System Switches to Agentless Trend Micro VDI Security
[Case Study ~ 2011] Baptist Hospitals of Southest Texas from Trend Micro
]]>
527 4 https://cdn.slidesharecdn.com/ss_thumbnails/casestudybaptisthospitalsofsouthesttexas-111002205859-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Who owns security in the cloud /slideshow/who-owns-security-in-the-cloud-8685767/8685767 whoownssecurityinthecloud-110725124022-phpapp02
]]>

]]>
Mon, 25 Jul 2011 12:40:21 GMT /slideshow/who-owns-security-in-the-cloud-8685767/8685767 trendmicro@slideshare.net(trendmicro) Who owns security in the cloud trendmicro <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/whoownssecurityinthecloud-110725124022-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Who owns security in the cloud from Trend Micro
]]>
969 7 https://cdn.slidesharecdn.com/ss_thumbnails/whoownssecurityinthecloud-110725124022-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques /slideshow/encryption-in-the-public-cloud-16-bits-of-advice-for-security-techniques/7365255 aspreysdforumslidesonnewcorpmaster3-23-11r-1-110323192250-phpapp02
Dave Asprey, VP-Cloud Security of Trend Micro presented to members of the SDforum in Jan. 2011. This is an adapted version of is presentation which covers key considerations addressing data privacy concerns in the Cloud.]]>

Dave Asprey, VP-Cloud Security of Trend Micro presented to members of the SDforum in Jan. 2011. This is an adapted version of is presentation which covers key considerations addressing data privacy concerns in the Cloud.]]>
Wed, 23 Mar 2011 19:22:47 GMT /slideshow/encryption-in-the-public-cloud-16-bits-of-advice-for-security-techniques/7365255 trendmicro@slideshare.net(trendmicro) Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques trendmicro Dave Asprey, VP-Cloud Security of Trend Micro presented to members of the SDforum in Jan. 2011. This is an adapted version of is presentation which covers key considerations addressing data privacy concerns in the Cloud. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/aspreysdforumslidesonnewcorpmaster3-23-11r-1-110323192250-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Dave Asprey, VP-Cloud Security of Trend Micro presented to members of the SDforum in Jan. 2011. This is an adapted version of is presentation which covers key considerations addressing data privacy concerns in the Cloud.
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques from Trend Micro
]]>
2112 5 https://cdn.slidesharecdn.com/ss_thumbnails/aspreysdforumslidesonnewcorpmaster3-23-11r-1-110323192250-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Threat predictions 2011 /slideshow/threat-predictions-2011/6202034 threatpredictions2011v-3-101216191743-phpapp01
More than 80% of Todays Top Malware Arrives via Web. More than 80% of Todays Top Malware Arrives via Web. And Security Demands on cloud service providers will increase. See the rest of Trend Micro's predictions for 2011. ]]>

More than 80% of Todays Top Malware Arrives via Web. More than 80% of Todays Top Malware Arrives via Web. And Security Demands on cloud service providers will increase. See the rest of Trend Micro's predictions for 2011. ]]>
Thu, 16 Dec 2010 19:17:38 GMT /slideshow/threat-predictions-2011/6202034 trendmicro@slideshare.net(trendmicro) Threat predictions 2011 trendmicro More than 80% of Todays Top Malware Arrives via Web. More than 80% of Todays Top Malware Arrives via Web. And Security Demands on cloud service providers will increase. See the rest of Trend Micro's predictions for 2011. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/threatpredictions2011v-3-101216191743-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> More than 80% of Todays Top Malware Arrives via Web. More than 80% of Todays Top Malware Arrives via Web. And Security Demands on cloud service providers will increase. See the rest of Trend Micro&#39;s predictions for 2011.
Threat predictions 2011 from Trend Micro
]]>
820 4 https://cdn.slidesharecdn.com/ss_thumbnails/threatpredictions2011v-3-101216191743-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Trend micro deep security /slideshow/trend-micro-deep-security/5828696 trendmicrodeepsecurity-101118174853-phpapp02
Meeting PCI DSS V 2.0 Compliance Requirements]]>

Meeting PCI DSS V 2.0 Compliance Requirements]]>
Thu, 18 Nov 2010 17:48:45 GMT /slideshow/trend-micro-deep-security/5828696 trendmicro@slideshare.net(trendmicro) Trend micro deep security trendmicro Meeting PCI DSS V 2.0 Compliance Requirements <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/trendmicrodeepsecurity-101118174853-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Meeting PCI DSS V 2.0 Compliance Requirements
Trend micro deep security from Trend Micro
]]>
3743 4 https://cdn.slidesharecdn.com/ss_thumbnails/trendmicrodeepsecurity-101118174853-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery /slideshow/wp04-tmes-healthcare100730us/5817066 wp04tmes-healthcare100730us-101117185511-phpapp02
]]>

]]>
Wed, 17 Nov 2010 18:54:55 GMT /slideshow/wp04-tmes-healthcare100730us/5817066 trendmicro@slideshare.net(trendmicro) Assuring regulatory compliance, ePHI protection, and secure healthcare delivery trendmicro <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wp04tmes-healthcare100730us-101117185511-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery from Trend Micro
]]>
421 2 https://cdn.slidesharecdn.com/ss_thumbnails/wp04tmes-healthcare100730us-101117185511-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
https://cdn.slidesharecdn.com/profile-photo-trendmicro-48x48.jpg?cb=1626880180 Entrepreneurial attitude topped off with an idealistic approach to continuous learning and improvement. When it comes to marketing, I love helping things (and people) grow - my team, my business, ROI, traffic, conversions, campaign reach, brand awareness, and so much more. I have a unique ability to measure both the creative and demographic elements of a campaign while weighing the cost, ROI and overall key performance metrics, giving me the insight to determine an overall potential for success. My passion is for the online environment - website user experience, social media, content strategy, SEO and SEM. Using all of these elements in combination with an integrated strategy of common... www.trendmicro.com https://cdn.slidesharecdn.com/ss_thumbnails/hmi2-190408140202-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/industrial-remote-controllers-safety-security-vulnerabilities/140032515 Industrial Remote Cont... https://cdn.slidesharecdn.com/ss_thumbnails/investing-web-defacement-campaigns-at-large-180625175345-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/investigating-web-defacement-campaigns-at-large/103003574 Investigating Web Defa... https://cdn.slidesharecdn.com/ss_thumbnails/preso-180607143308-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/behind-the-scene-of-malware-operators-insights-and-countermeasures-confidence-2018-kracow-05062018/101135353 Behind the scene of ma...