Trend Micro CISO : Digital Transformation

A Necessary Digital Odyssey of RPA and AI/ML at HUD

A Necessary Digital Odyssey of RPA and AI/ML at HUD 2024-03-13 at 05:57 By Explore two RPA and AI/ML use cases at HUD during the operational challenges of the longest US Government shutdown, a rigid legacy IT environment, and complex federal regulations. This article is an excerpt from Trend Micro Research, News and Perspectives View […]

React to this headline:

Loading spinner

A Necessary Digital Odyssey of RPA and AI/ML at HUD Read More »

AI Auctions: Collectibles, Taylor Swift, Jordan Bots

AI Auctions: Collectibles, Taylor Swift, Jordan Bots 2024-03-06 at 06:48 By Discover the fascinating world of AI, ML, and RPA and their real-world applications including the creation of a custom RPA bot for collecting rare sports memorabilia. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

AI Auctions: Collectibles, Taylor Swift, Jordan Bots Read More »

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era 2024-02-21 at 04:31 By Explore the first article in this series about AI, ML, and RPA, which aims to demystify and explore the full spectrum of these core technologies. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era Read More »

What Generative AI Means for Cybersecurity in 2024

What Generative AI Means for Cybersecurity in 2024 2024-02-08 at 19:00 By After a full year of life with ChatGPT cybersecurity experts have a clearer sense of how criminals are using generative AI to enhance attacks – learn what generative AI means for cybersecurity in 2024. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

What Generative AI Means for Cybersecurity in 2024 Read More »

Embracing a risk-based cybersecurity approach with ASRM

Embracing a risk-based cybersecurity approach with ASRM 2024-01-18 at 03:17 By Explore how a risk-based cybersecurity approach is critical to proactively stop dynamic, ever-evolving threats. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Embracing a risk-based cybersecurity approach with ASRM Read More »

Modern Attack Surface Management (ASM) for SecOps

Modern Attack Surface Management (ASM) for SecOps 15/12/2023 at 02:11 By Today’s attack surface requires modern processes and security solutions. Explore the tenants of modern attack surface management (ASM) and what SecOps need to look for in an ASM solution. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Modern Attack Surface Management (ASM) for SecOps Read More »

Modern Attack Surface Management for Cloud Teams

Modern Attack Surface Management for Cloud Teams 27/11/2023 at 13:32 By Today’s attack surface requires modern processes and security solutions. Explore the tenants of modern attack surface management (ASM) and what Cloud teams need to look for in an ASM solution. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Modern Attack Surface Management for Cloud Teams Read More »

Accelerating Security Risk Management

Accelerating Security Risk Management 21/11/2023 at 23:17 By In response to the expanding attack surface, Mike Milner, Trend Micro VP of Cloud Technology, explores the role security risk management plays in this new era of cybersecurity and how IT leaders are accelerating innovation. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Accelerating Security Risk Management Read More »

Strategic Tips to Optimize Cybersecurity Consolidation

Strategic Tips to Optimize Cybersecurity Consolidation 25/10/2023 at 21:50 By Say goodbye to security silos. Organizations are eager to take advantage of cybersecurity consolidation and make their security environments more manageable. Evolving incrementally and adopting a platform that supports third-party integrations are key to reducing cybersecurity complexity. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

Strategic Tips to Optimize Cybersecurity Consolidation Read More »

Email Security Best Practices for Phishing Prevention

Email Security Best Practices for Phishing Prevention 17/10/2023 at 06:02 By Trend Micro Research reported a 29% growth in phishing attacks blocked and detected in 2022. Explore the latest phishing trends and email security best practices to enhance your email security and reduce cyber risk. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

Email Security Best Practices for Phishing Prevention Read More »

Cybersecurity Awareness Month 2023: 4 Actionable Tips

Cybersecurity Awareness Month 2023: 4 Actionable Tips 26/09/2023 at 21:03 By Make Cybersecurity Awareness Month a year-long initiative with these three actionable security tips to reduce cyber risk across the attack surface. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Cybersecurity Awareness Month 2023: 4 Actionable Tips Read More »

Protect CNC Machines in Networked IT/OT Environments

Protect CNC Machines in Networked IT/OT Environments 19/09/2023 at 20:49 By Networking IT/OT environments is a bit like walking a tightrope, balancing the pursuit of intelligence and efficiency against the risks of exposing OT systems to the wider world. Trend Micro recently teamed up with global machine tool company Celada to identify specific risks associated

React to this headline:

Loading spinner

Protect CNC Machines in Networked IT/OT Environments Read More »

Biden National Cybersecurity Strategy Key Takeaways

Biden National Cybersecurity Strategy Key Takeaways 16/09/2023 at 01:33 By Major changes are underway, with new rules for federal agencies and updated requirements for public-private partnerships. We discuss the implementation plans for the strategy’s first two pillars: defend critical infrastructure and disrupt and dismantle threat actors. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

Biden National Cybersecurity Strategy Key Takeaways Read More »

How Zero Trust and XDR Work Together

How Zero Trust and XDR Work Together 07/09/2023 at 05:17 By As the Zero Trust approach gains momentum, more organizations are looking to apply it to their security strategy. Learn how XDR and Zero Trust work together to enhance your security posture. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

How Zero Trust and XDR Work Together Read More »

4 Popular Cybersecurity Myths vs. Facts

4 Popular Cybersecurity Myths vs. Facts 29/08/2023 at 05:04 By Any cybersecurity approach is only as strong as its underlying assumptions. What happens when those assumptions are wrong? Find out where confusion about cybersecurity facts can lead organizations astray. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

4 Popular Cybersecurity Myths vs. Facts Read More »

Ex-USSS CISO Explains Agencies’ Struggle with Biden EO

Ex-USSS CISO Explains Agencies’ Struggle with Biden EO 22/08/2023 at 20:02 By Ed Cabrera, former CISO of the US Secret Service and current Chief Cybersecurity Officer for Trend Micro, explains why Federal agencies are slow to comply with Biden’s cybersecurity executive order. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

Ex-USSS CISO Explains Agencies’ Struggle with Biden EO Read More »

5 Types of Cyber Crime Groups

5 Types of Cyber Crime Groups 17/08/2023 at 21:48 By Discover the five main types of cyber crime groups: access as a service, ransomware as a service, bulletproof hosting, crowd sourcing, and phishing as a service as well as tips to strengthen your defense strategy. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

5 Types of Cyber Crime Groups Read More »

4 Generative AI Security Benefits

4 Generative AI Security Benefits 01/08/2023 at 17:34 By It may be some time before generative AI security can autonomously mitigate cyber threats, but we’re already seeing early examples of how AI models can strengthen enterprise cybersecurity in powerful and transformative ways. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

4 Generative AI Security Benefits Read More »

How a Cyber Security Platform Addresses the 3 “S”

How a Cyber Security Platform Addresses the 3 “S” 27/07/2023 at 23:34 By Explore how a security platform can help organizations address the 3 “S” impacting cybersecurity: stealth, sustainability, and shortage. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

How a Cyber Security Platform Addresses the 3 “S” Read More »

Security Patch Management Strengthens Ransomware Defense

Security Patch Management Strengthens Ransomware Defense 20/07/2023 at 21:48 By With thousands of applications to manage, enterprises need an effective way to prioritize software security patches. That calls for a contextualized, risk-based approach and good overall attack surface risk management. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Security Patch Management Strengthens Ransomware Defense Read More »

Scroll to Top