Trend Micro CISO : Expert Perspective

A Necessary Digital Odyssey of RPA and AI/ML at HUD

A Necessary Digital Odyssey of RPA and AI/ML at HUD 2024-03-13 at 05:57 By Explore two RPA and AI/ML use cases at HUD during the operational challenges of the longest US Government shutdown, a rigid legacy IT environment, and complex federal regulations. This article is an excerpt from Trend Micro Research, News and Perspectives View […]

React to this headline:

Loading spinner

A Necessary Digital Odyssey of RPA and AI/ML at HUD Read More »

AI Auctions: Collectibles, Taylor Swift, Jordan Bots

AI Auctions: Collectibles, Taylor Swift, Jordan Bots 2024-03-06 at 06:48 By Discover the fascinating world of AI, ML, and RPA and their real-world applications including the creation of a custom RPA bot for collecting rare sports memorabilia. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

AI Auctions: Collectibles, Taylor Swift, Jordan Bots Read More »

Managing Cyber Risk for Under-Pressure CISOs

Managing Cyber Risk for Under-Pressure CISOs 2024-02-28 at 03:47 By Overworked CISOs are struggling to deliver the cybersecurity results their organizations expect. Fortunately, there are concrete and practical ways they can make their lives easier—while managing cyber risk effectively. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Managing Cyber Risk for Under-Pressure CISOs Read More »

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era 2024-02-21 at 04:31 By Explore the first article in this series about AI, ML, and RPA, which aims to demystify and explore the full spectrum of these core technologies. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era Read More »

Cyber Risk Management: Bring Security to the Boardroom

Cyber Risk Management: Bring Security to the Boardroom 2024-02-14 at 19:31 By Discover how to strategically present security controls to the board to better manage cyber risk. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Cyber Risk Management: Bring Security to the Boardroom Read More »

What Generative AI Means for Cybersecurity in 2024

What Generative AI Means for Cybersecurity in 2024 2024-02-08 at 19:00 By After a full year of life with ChatGPT cybersecurity experts have a clearer sense of how criminals are using generative AI to enhance attacks – learn what generative AI means for cybersecurity in 2024. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

What Generative AI Means for Cybersecurity in 2024 Read More »

Unifying Cloud Security Beyond Siloes

Unifying Cloud Security Beyond Siloes 2024-02-06 at 20:32 By Attacks don’t stay in siloes, and neither should your security solutions. Explore the benefits of a cybersecurity platform that consolidates security across multiple layers—including the cloud—for more proactive risk management. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React

React to this headline:

Loading spinner

Unifying Cloud Security Beyond Siloes Read More »

18X a Leader in Gartner Magic Quadrant for EPP

18X a Leader in Gartner Magic Quadrant for EPP 2024-01-23 at 01:17 By Explore why Trend Micro is recognized—for the 18th time—as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

18X a Leader in Gartner Magic Quadrant for EPP Read More »

Embracing a risk-based cybersecurity approach with ASRM

Embracing a risk-based cybersecurity approach with ASRM 2024-01-18 at 03:17 By Explore how a risk-based cybersecurity approach is critical to proactively stop dynamic, ever-evolving threats. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Embracing a risk-based cybersecurity approach with ASRM Read More »

3 Strategic Insights from Cybersecurity Leader Study

3 Strategic Insights from Cybersecurity Leader Study 19/12/2023 at 09:19 By Explore the results of a Sapio Research survey commissioned by Trend Micro about how CISOs and other technology leaders are overcoming today’s biggest challenges. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

3 Strategic Insights from Cybersecurity Leader Study Read More »

Modern Attack Surface Management (ASM) for SecOps

Modern Attack Surface Management (ASM) for SecOps 15/12/2023 at 02:11 By Today’s attack surface requires modern processes and security solutions. Explore the tenants of modern attack surface management (ASM) and what SecOps need to look for in an ASM solution. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Modern Attack Surface Management (ASM) for SecOps Read More »

Modern Attack Surface Management for Cloud Teams

Modern Attack Surface Management for Cloud Teams 27/11/2023 at 13:32 By Today’s attack surface requires modern processes and security solutions. Explore the tenants of modern attack surface management (ASM) and what Cloud teams need to look for in an ASM solution. This article is an excerpt from Trend Micro Research, News and Perspectives View Original

React to this headline:

Loading spinner

Modern Attack Surface Management for Cloud Teams Read More »

Accelerating Security Risk Management

Accelerating Security Risk Management 21/11/2023 at 23:17 By In response to the expanding attack surface, Mike Milner, Trend Micro VP of Cloud Technology, explores the role security risk management plays in this new era of cybersecurity and how IT leaders are accelerating innovation. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Accelerating Security Risk Management Read More »

Against the Clock: Cyber Incident Response Plan

Against the Clock: Cyber Incident Response Plan 14/11/2023 at 05:02 By Conventional wisdom says most organizations will experience a cybersecurity breach at some point—if they haven’t already. That makes having a ready-to-launch incident response process crucial when an attack is detected, as this fictionalized scenario shows. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

Against the Clock: Cyber Incident Response Plan Read More »

Implementing Zero Trust: 5 Key Considerations

Implementing Zero Trust: 5 Key Considerations 08/11/2023 at 21:02 By When implementing a Zero Trust strategy and selecting a solution to safeguard your company against cyber risk, there are many factors to consider. Five key areas include Visibility and Analytics, Automation and Orchestration, Central Management, Analyst Experience, and Pricing Flexibility and Transparency. This article is

React to this headline:

Loading spinner

Implementing Zero Trust: 5 Key Considerations Read More »

Securing Cloud Infrastructure Demands a New Mindset

Securing Cloud Infrastructure Demands a New Mindset 04/11/2023 at 20:16 By Rising attacks on cloud infrastructure and services have created a ‘shared fate’ scenario for cloud providers and users, where a successful breach means everybody loses. Fresh thinking and closer collaboration can help avoid that outcome and better protect public cloud resources. This article is

React to this headline:

Loading spinner

Securing Cloud Infrastructure Demands a New Mindset Read More »

Securing Cloud Infrastructure Demands a New Mindset

Securing Cloud Infrastructure Demands a New Mindset 31/10/2023 at 21:47 By Rising attacks on cloud infrastructure and services have created a ‘shared fate’ scenario for cloud providers and users, where a successful breach means everybody loses. Fresh thinking and closer collaboration can help avoid that outcome and better protect public cloud resources. This article is

React to this headline:

Loading spinner

Securing Cloud Infrastructure Demands a New Mindset Read More »

Strategic Tips to Optimize Cybersecurity Consolidation

Strategic Tips to Optimize Cybersecurity Consolidation 25/10/2023 at 21:50 By Say goodbye to security silos. Organizations are eager to take advantage of cybersecurity consolidation and make their security environments more manageable. Evolving incrementally and adopting a platform that supports third-party integrations are key to reducing cybersecurity complexity. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

Strategic Tips to Optimize Cybersecurity Consolidation Read More »

Email Security Best Practices for Phishing Prevention

Email Security Best Practices for Phishing Prevention 17/10/2023 at 06:02 By Trend Micro Research reported a 29% growth in phishing attacks blocked and detected in 2022. Explore the latest phishing trends and email security best practices to enhance your email security and reduce cyber risk. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

Email Security Best Practices for Phishing Prevention Read More »

How to Prevent Ransomware as a Service (RaaS) Attacks

How to Prevent Ransomware as a Service (RaaS) Attacks 12/10/2023 at 04:48 By Explore key insights on how ransomware as a service (RaaS) operators work and how to prevent ransomware attacks. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

How to Prevent Ransomware as a Service (RaaS) Attacks Read More »

Optimized by Optimole
Scroll to Top