Trend Micro CISO : Article

Biden National Cybersecurity Strategy Key Takeaways

Biden National Cybersecurity Strategy Key Takeaways 16/09/2023 at 01:33 By Major changes are underway, with new rules for federal agencies and updated requirements for public-private partnerships. We discuss the implementation plans for the strategy’s first two pillars: defend critical infrastructure and disrupt and dismantle threat actors. This article is an excerpt from Trend Micro Research, […]

React to this headline:

Loading spinner

Biden National Cybersecurity Strategy Key Takeaways Read More »

3 Strategic Insights from Cybersecurity Leader Study

3 Strategic Insights from Cybersecurity Leader Study 14/09/2023 at 20:45 By Explore the results of a Sapio Research survey commissioned by Trend Micro about how CISOs and other technology leaders are overcoming today’s biggest challenges. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

3 Strategic Insights from Cybersecurity Leader Study Read More »

TrickBot & Conti Sanctions: Implications for CISOs & Boardrooms

TrickBot & Conti Sanctions: Implications for CISOs & Boardrooms 09/09/2023 at 01:01 By Discover what the increased regulatory risk due to recent US and UK sanctions imposed on TrickBot and Conti cybercriminals mean for CISOs and board members. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

TrickBot & Conti Sanctions: Implications for CISOs & Boardrooms Read More »

How Zero Trust and XDR Work Together

How Zero Trust and XDR Work Together 07/09/2023 at 05:17 By As the Zero Trust approach gains momentum, more organizations are looking to apply it to their security strategy. Learn how XDR and Zero Trust work together to enhance your security posture. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

How Zero Trust and XDR Work Together Read More »

IT & OT security: How to Bridge the Gap

IT & OT security: How to Bridge the Gap 01/09/2023 at 04:18 By Connecting IT and OT environments can give industrial organizations powerful efficiencies, but it also introduces cybersecurity challenges. A new Trend Micro/SANS Institute report gets at the heart of those IT and OT security issues—and how to address them. This article is an

React to this headline:

Loading spinner

IT & OT security: How to Bridge the Gap Read More »

4 Popular Cybersecurity Myths vs. Facts

4 Popular Cybersecurity Myths vs. Facts 29/08/2023 at 05:04 By Any cybersecurity approach is only as strong as its underlying assumptions. What happens when those assumptions are wrong? Find out where confusion about cybersecurity facts can lead organizations astray. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

4 Popular Cybersecurity Myths vs. Facts Read More »

Ex-USSS CISO Explains Agencies’ Struggle with Biden EO

Ex-USSS CISO Explains Agencies’ Struggle with Biden EO 22/08/2023 at 20:02 By Ed Cabrera, former CISO of the US Secret Service and current Chief Cybersecurity Officer for Trend Micro, explains why Federal agencies are slow to comply with Biden’s cybersecurity executive order. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

Ex-USSS CISO Explains Agencies’ Struggle with Biden EO Read More »

5 Types of Cyber Crime Groups

5 Types of Cyber Crime Groups 17/08/2023 at 21:48 By Discover the five main types of cyber crime groups: access as a service, ransomware as a service, bulletproof hosting, crowd sourcing, and phishing as a service as well as tips to strengthen your defense strategy. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

5 Types of Cyber Crime Groups Read More »

4 Generative AI Security Benefits

4 Generative AI Security Benefits 01/08/2023 at 17:34 By It may be some time before generative AI security can autonomously mitigate cyber threats, but we’re already seeing early examples of how AI models can strengthen enterprise cybersecurity in powerful and transformative ways. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

4 Generative AI Security Benefits Read More »

Security Patch Management Strengthens Ransomware Defense

Security Patch Management Strengthens Ransomware Defense 20/07/2023 at 21:48 By With thousands of applications to manage, enterprises need an effective way to prioritize software security patches. That calls for a contextualized, risk-based approach and good overall attack surface risk management. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Security Patch Management Strengthens Ransomware Defense Read More »

Intrusion Detection & Prevention Systems Guide

Intrusion Detection & Prevention Systems Guide 11/07/2023 at 19:46 By IDPS, IDS, IPS… what’s the difference? Discover key differences between intrusion detection and prevention systems as well as 9 technical and non-technical questions to ask when evaluating vendors. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

Intrusion Detection & Prevention Systems Guide Read More »

How to Reach Compliance with HIPAA

How to Reach Compliance with HIPAA 27/06/2023 at 09:21 By Explore how to fulfil HIPAA compliance standards without friction This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

How to Reach Compliance with HIPAA Read More »

Decrypting Cyber Risk Quantification

Decrypting Cyber Risk Quantification 20/06/2023 at 04:04 By Discover the evolution of cyber risk quantification, criteria for an accurate risk score, and its benefits across the organization. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Decrypting Cyber Risk Quantification Read More »

Ransomware Insurance: Security Strategies to Obtain Coverage

Ransomware Insurance: Security Strategies to Obtain Coverage 13/06/2023 at 11:18 By Ransomware accounts for 75% of all cyber insurance claims, yet 40% of business currently lack the coverage needed. Discover security strategies to help you meet ransomware insurance requirements. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Ransomware Insurance: Security Strategies to Obtain Coverage Read More »

Essential Cybersecurity Compliance Standards

Essential Cybersecurity Compliance Standards 08/06/2023 at 18:48 By With the continued expansion of your attack surface, cybersecurity compliance has become more important than ever. Gain an overview of the most popular compliance standards, including HIPAA, NIST, ISO, and PCI DSS, to safeguard your business against potential risks. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

Essential Cybersecurity Compliance Standards Read More »

Generative AI: What Every CISO Needs to Know

Generative AI: What Every CISO Needs to Know 01/06/2023 at 23:19 By New technologies always change the security landscape, but few are likely to have the transformative power of generative AI. As platforms like ChatGPT continue to catch on, CISOs need to understand the unprecedented cybersecurity risks they bring—and what to do about them. This

React to this headline:

Loading spinner

Generative AI: What Every CISO Needs to Know Read More »

Against the Clock: Cyber Incident Response Plan

Against the Clock: Cyber Incident Response Plan 24/05/2023 at 05:14 By Conventional wisdom says most organizations will experience a cybersecurity breach at some point—if they haven’t already. That makes having a ready-to-launch incident response process crucial when an attack is detected, as this fictionalized scenario shows. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

Against the Clock: Cyber Incident Response Plan Read More »

Accelerating Security Risk Management

Accelerating Security Risk Management 18/05/2023 at 20:51 By In response to the expanding attack surface, Mike Milner, Trend Micro VP of Cloud Technology, explores the role security risk management plays in this new era of cybersecurity and how IT leaders are accelerating innovation. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Accelerating Security Risk Management Read More »

Manage Cyber Risk with a Platform Approach

Manage Cyber Risk with a Platform Approach 11/05/2023 at 06:34 By Discover how a platform approach can best assist and support security operations teams with a cyber risk management so you can be more resilient with less resources. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

Manage Cyber Risk with a Platform Approach Read More »

Data Exfiltration Prevention with Zero Trust

Data Exfiltration Prevention with Zero Trust 09/05/2023 at 08:13 By Data exposure from SaaS and cloud applications is an increasing risk factor facing businesses today. Discover how SASE capabilities can help prevent data exfiltration, achieve zero trust, and reduce cyber risk across the attack surface. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

Data Exfiltration Prevention with Zero Trust Read More »

Scroll to Top