Trend Micro CISO : Detection and Response

Managing Cyber Risk for Under-Pressure CISOs

Managing Cyber Risk for Under-Pressure CISOs 2024-02-28 at 03:47 By Overworked CISOs are struggling to deliver the cybersecurity results their organizations expect. Fortunately, there are concrete and practical ways they can make their lives easier—while managing cyber risk effectively. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React […]

React to this headline:

Loading spinner

Managing Cyber Risk for Under-Pressure CISOs Read More »

Cyber Risk Management: Bring Security to the Boardroom

Cyber Risk Management: Bring Security to the Boardroom 2024-02-14 at 19:31 By Discover how to strategically present security controls to the board to better manage cyber risk. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Cyber Risk Management: Bring Security to the Boardroom Read More »

What Generative AI Means for Cybersecurity in 2024

What Generative AI Means for Cybersecurity in 2024 2024-02-08 at 19:00 By After a full year of life with ChatGPT cybersecurity experts have a clearer sense of how criminals are using generative AI to enhance attacks – learn what generative AI means for cybersecurity in 2024. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

What Generative AI Means for Cybersecurity in 2024 Read More »

Unifying Cloud Security Beyond Siloes

Unifying Cloud Security Beyond Siloes 2024-02-06 at 20:32 By Attacks don’t stay in siloes, and neither should your security solutions. Explore the benefits of a cybersecurity platform that consolidates security across multiple layers—including the cloud—for more proactive risk management. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Unifying Cloud Security Beyond Siloes Read More »

Embracing a risk-based cybersecurity approach with ASRM

Embracing a risk-based cybersecurity approach with ASRM 2024-01-18 at 03:17 By Explore how a risk-based cybersecurity approach is critical to proactively stop dynamic, ever-evolving threats. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Embracing a risk-based cybersecurity approach with ASRM Read More »

Modern Attack Surface Management (ASM) for SecOps

Modern Attack Surface Management (ASM) for SecOps 15/12/2023 at 02:11 By Today’s attack surface requires modern processes and security solutions. Explore the tenants of modern attack surface management (ASM) and what SecOps need to look for in an ASM solution. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Modern Attack Surface Management (ASM) for SecOps Read More »

Modern Attack Surface Management for Cloud Teams

Modern Attack Surface Management for Cloud Teams 27/11/2023 at 13:32 By Today’s attack surface requires modern processes and security solutions. Explore the tenants of modern attack surface management (ASM) and what Cloud teams need to look for in an ASM solution. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Modern Attack Surface Management for Cloud Teams Read More »

Accelerating Security Risk Management

Accelerating Security Risk Management 21/11/2023 at 23:17 By In response to the expanding attack surface, Mike Milner, Trend Micro VP of Cloud Technology, explores the role security risk management plays in this new era of cybersecurity and how IT leaders are accelerating innovation. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Accelerating Security Risk Management Read More »

Against the Clock: Cyber Incident Response Plan

Against the Clock: Cyber Incident Response Plan 14/11/2023 at 05:02 By Conventional wisdom says most organizations will experience a cybersecurity breach at some point—if they haven’t already. That makes having a ready-to-launch incident response process crucial when an attack is detected, as this fictionalized scenario shows. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

Against the Clock: Cyber Incident Response Plan Read More »

Implementing Zero Trust: 5 Key Considerations

Implementing Zero Trust: 5 Key Considerations 08/11/2023 at 21:02 By When implementing a Zero Trust strategy and selecting a solution to safeguard your company against cyber risk, there are many factors to consider. Five key areas include Visibility and Analytics, Automation and Orchestration, Central Management, Analyst Experience, and Pricing Flexibility and Transparency. This article is

React to this headline:

Loading spinner

Implementing Zero Trust: 5 Key Considerations Read More »

Strategic Tips to Optimize Cybersecurity Consolidation

Strategic Tips to Optimize Cybersecurity Consolidation 25/10/2023 at 21:50 By Say goodbye to security silos. Organizations are eager to take advantage of cybersecurity consolidation and make their security environments more manageable. Evolving incrementally and adopting a platform that supports third-party integrations are key to reducing cybersecurity complexity. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

Strategic Tips to Optimize Cybersecurity Consolidation Read More »

Email Security Best Practices for Phishing Prevention

Email Security Best Practices for Phishing Prevention 17/10/2023 at 06:02 By Trend Micro Research reported a 29% growth in phishing attacks blocked and detected in 2022. Explore the latest phishing trends and email security best practices to enhance your email security and reduce cyber risk. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

Email Security Best Practices for Phishing Prevention Read More »

Cybersecurity Awareness Month 2023: 4 Actionable Tips

Cybersecurity Awareness Month 2023: 4 Actionable Tips 26/09/2023 at 21:03 By Make Cybersecurity Awareness Month a year-long initiative with these three actionable security tips to reduce cyber risk across the attack surface. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Cybersecurity Awareness Month 2023: 4 Actionable Tips Read More »

Protect CNC Machines in Networked IT/OT Environments

Protect CNC Machines in Networked IT/OT Environments 19/09/2023 at 20:49 By Networking IT/OT environments is a bit like walking a tightrope, balancing the pursuit of intelligence and efficiency against the risks of exposing OT systems to the wider world. Trend Micro recently teamed up with global machine tool company Celada to identify specific risks associated

React to this headline:

Loading spinner

Protect CNC Machines in Networked IT/OT Environments Read More »

Biden National Cybersecurity Strategy Key Takeaways

Biden National Cybersecurity Strategy Key Takeaways 16/09/2023 at 01:33 By Major changes are underway, with new rules for federal agencies and updated requirements for public-private partnerships. We discuss the implementation plans for the strategy’s first two pillars: defend critical infrastructure and disrupt and dismantle threat actors. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

Biden National Cybersecurity Strategy Key Takeaways Read More »

How Zero Trust and XDR Work Together

How Zero Trust and XDR Work Together 07/09/2023 at 05:17 By As the Zero Trust approach gains momentum, more organizations are looking to apply it to their security strategy. Learn how XDR and Zero Trust work together to enhance your security posture. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

How Zero Trust and XDR Work Together Read More »

IT & OT security: How to Bridge the Gap

IT & OT security: How to Bridge the Gap 01/09/2023 at 04:18 By Connecting IT and OT environments can give industrial organizations powerful efficiencies, but it also introduces cybersecurity challenges. A new Trend Micro/SANS Institute report gets at the heart of those IT and OT security issues—and how to address them. This article is an

React to this headline:

Loading spinner

IT & OT security: How to Bridge the Gap Read More »

Ex-USSS CISO Explains Agencies’ Struggle with Biden EO

Ex-USSS CISO Explains Agencies’ Struggle with Biden EO 22/08/2023 at 20:02 By Ed Cabrera, former CISO of the US Secret Service and current Chief Cybersecurity Officer for Trend Micro, explains why Federal agencies are slow to comply with Biden’s cybersecurity executive order. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

Ex-USSS CISO Explains Agencies’ Struggle with Biden EO Read More »

5 Types of Cyber Crime Groups

5 Types of Cyber Crime Groups 17/08/2023 at 21:48 By Discover the five main types of cyber crime groups: access as a service, ransomware as a service, bulletproof hosting, crowd sourcing, and phishing as a service as well as tips to strengthen your defense strategy. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

5 Types of Cyber Crime Groups Read More »

4 Generative AI Security Benefits

4 Generative AI Security Benefits 01/08/2023 at 17:34 By It may be some time before generative AI security can autonomously mitigate cyber threats, but we’re already seeing early examples of how AI models can strengthen enterprise cybersecurity in powerful and transformative ways. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

4 Generative AI Security Benefits Read More »

Scroll to Top