Monthly Threat

Presented by Jon Clay

This month:  2021 Security Predictions

Tuesday, January 26th | 1:00 p.m. ET

With 2020 finally in the rearview, our Trend Micro researchers have put on their forward-looking hats to craft a set of security predictions our customers and the world may see in the new year.

Join my monthly threat webinar and live Q&A session as we discuss:

  • The 2021 predictions we’ve created through months of intel and research
  • Insight into which trends you should pay attention to in the upcoming year
  • The specific areas in which you want to build your security controls around

Jon Clay
Director: Global Threat Communications
Trend Micro

Jon Clay has worked in the cybersecurity space for over 22 years. He is responsible for managing marketing messages and external publication of all threat research and intelligence within Trend Micro as well as different core technologies.  As an accomplished public speaker with hundreds of speaking sessions around the globe, Jon focuses on the threat landscape and the use of big data in protecting against today’s sophisticated threats.  

Read Jon's weekly blog, This Week in Security News, to stay up to date on the latest cybersecurity news and events.

14Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Miss a webinar? Catch up here:


January:  Security Predictions for 2020
February: Anatomy of an Attack
March: Coronavirus is the Latest Lure for Attackers
April: The Latest on Ransomware Tactics and Targets
May: Threats Targeting Web Applications
June: Shifts in the CybercriminalUndergrounds
July: Five-Year Celebration and Open Q&A
September: 2020 Mid-Year Security Roundup
October: The Five Scariest Threats
November: Common Attack Methods Today
December: Malicious Uses of AI by Cybercriminals


January:  Making Sense of the Cloud, Containers, and Serverless
February:  Using AI/Machine Learning in Cybersecurity
March:  The Past, Present, and Future of Cyber Threats
April:  Bug Bounties and How They Help
May:  Trends in Email-Based Threats
June:  The Latest on Ransomware
July:  New Threats to Your Mobile Devices
September:  How 5 Cybercriminal Undergrounds Use IoT Attacks
November: What’s Up with Web Threats?


January:  Latest Business Email Compromise Trends
February:  2017 Security Roundup—Look Back to See Forward
March:  Cybercriminal Operations Revealed
April:  The 5 Types of BEC Scams
May:  Cryptocurrency Threats
June:  Recent Mobile Threat Trends
July:  Fileless Malware Update
August:  Security Roundup Review
October:  Trends in Vulnerabilities and Exploits
November:  Targeted Attack Methods and Protections
December:  Security Predictions for 2019


January:  Security Predictions for 2017
February:  2016 Security Roundup
March:  West Africa Cyber Underground
April:  Pawn Storm Cyber Espionage Group
May:  WCRY (WannaCry) Ransomware: Facts and Mitigation
June #1:  What You Need to Know About Linux Threats 
June #2:  Petya Ransomware: Facts and Mitigation
July:  Business Process Compromise
August:  Insider Threats Are Not What You Think
September:  Security Roundup – The Cost of Compromise
October:  How GDPR affects your organization
November:  Taking Steps Towards Secure Manufacturing
December:  Top 7 Security Predictions of 2018


January:  Destructive Attacks to Critical Infrastructure
March:  Business Email Compromise
April:  0-Days & Virtual Patching
May:  Go From Hunted to Hunting
June:  Exploit Kits
August:  1H'16 Security Roundup
September:  Mobile Ransomware
October:  The Scariest Ransomware Families
November:  Crimeware as a Service (CaaS)


July:  Recent Data Breaches
August:  Latest Web Threats
September:  Cybersecurity News
October:  2016 Security Predictions
November:  Findings from the FBI Special Guest
December:  Top Vulnerabilities

Improved Security

Upgrade to Trend Micro Deep Security 12 to improves upon our leading threat detection and prevention, including:

Advanced container traffic scanning: Including inter-container “East-West” traffic
• Enriched real-time integrity monitoring: Capturing additional telemetry data to provide more context and information for detections and investigations
• Automatic anti-malware engine updating: Ensuring up-to-date anti-malware protection without manual intervention or system reboot

Extended Platform Support

Trend Micro continues to update our extensive platform and database support, including agentless anti-malware support for VMware® NSX-T.  More info here > (placeholder link)

Simplified Management

Your upgrade to Deep Security 12 makes it easier to manage your daily security operations, giving you:

• Automated cleanup of inactive agents: Ensuring optimal performance
• Upgrade on activation of agents: Removing the need for manual upgrading
• New RESTful APIs: Enabling automated provisioning and management of security

Visit the Automation Center for more information >

Deep Security 12 also improves your upgrade experience:

• Anti-malware protection remains during the entire agent upgrade process
• In agentless environments you can now automatically upgrade Deep Security Virtual Appliances, reducing the need for complex manual upgrades

Full Lifecycle Container Security

Deep Security 12 delivers additional protection for your runtime containers, including anti-malware and IPS, with inter-container traffic scanning. Additionally, you can secure your Docker and Kubernetes environments with the same Deep Security agent, leveraging distinct IPS, integrity monitoring, and log inspection rules.

Trend Micro Deep Security™ Smart Check supplements the full-stack runtime protection provided by Deep Security 12 and provides continuous image scanning for the software build pipeline, ensuring protection across the container lifecycle.

24Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.