ALPS blog

Hottest topics

Ransomware Spotlight: Hive

Hive ransomware is one of the new ransomware families in 2021 that poses significant challenges to enterprises worldwide. We take…

More >

What to Do About Log4j

What to Do About Log4j  Log4j poses some deep challenges to IT. In this article I’ll discuss some tactical measures…

More >

The end of the password disaster

By Richard Werner, Business Consultant On 15 September 2021, Microsoft announced the general availability of the passwordless account. As with…

More >

Empowering T-Mobile Consumers

The recent news of T-Mobile being breached and 40 million customers’ personal information potentially being sold on the dark web…

More >

Human weaknesses in security

By Richard Werner, Business Consultant Classic cyber attacks often start with an email. A user opens it and unsuspectingly clicks…

More >

Catastrophic IT security?

Comment by Dirk Arendt, Head of Government, Public & Healthcare at Trend Micro Germany After a serious cyber attack, the…

More >

Looking Ahead: The Post-Pandemic Security Landscape

One year into the pandemic, our team at Trend Micro discussed the lasting impact that Covid-19 will have on people’s way of life and what a post-pandemic “new normal” might look like. The coronavirus has…

More >

Future of P2P IoT Botnets

Original article Mayra Rosario Fuentes, Stephen Hilt, Robert McArdle, Fernando Merces, David Sancho, Threat Researchers The internet of things (IoT)…

More >

The plugins I called …

by Udo Schneider, IoT Security Evangelist Europe Who doesn’t know them – the ever-popular little helpers? Whether it’s the small…

More >