Trend Micro Research : Network

5 AI Security Takeaways featuring Forrester

5 AI Security Takeaways featuring Forrester 2024-11-14 at 01:04 By Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace. This article is an excerpt from Trend Micro Research, News […]

React to this headline:

Loading spinner

5 AI Security Takeaways featuring Forrester Read More »

SOC Around the Clock: World Tour Survey Findings

SOC Around the Clock: World Tour Survey Findings 2024-11-05 at 05:49 By Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what SOC teams had to say. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

SOC Around the Clock: World Tour Survey Findings Read More »

5 AI Security Takeaways featuring Forrester

5 AI Security Takeaways featuring Forrester 2024-10-17 at 23:34 By Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

5 AI Security Takeaways featuring Forrester Read More »

Cybersecurity Compass: Bridging the Communication Gap

Cybersecurity Compass: Bridging the Communication Gap 2024-09-27 at 05:16 By Discover how to use the Cybersecurity Compass to foster effective conversations about cybersecurity strategy between non-technical and technical audiences, focusing on the phases of before, during, and after a breach. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Cybersecurity Compass: Bridging the Communication Gap Read More »

Vulnerabilities in Cellular Packet Cores Part IV: Authentication

Vulnerabilities in Cellular Packet Cores Part IV: Authentication 2024-09-18 at 13:46 By Our research reveals two significant vulnerabilities in Microsoft Azure Private 5G Core (AP5GC). The first vulnerability (CVE-2024-20685) allows a crafted signaling message to crash the control plane, leading to potential service outages. The second (ZDI-CAN-23960) disconnects and replaces attached base stations, disrupting network

React to this headline:

Loading spinner

Vulnerabilities in Cellular Packet Cores Part IV: Authentication Read More »

Bringing Security Back into Balance

Bringing Security Back into Balance 2024-08-04 at 09:31 By This article by Trend Micro CEO Eva Chen brings focus back to striking the cybersecurity strategies balance between business C-suite and information technology (IT) departments. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Bringing Security Back into Balance Read More »

Cybersecurity Compass: An Integrated Cyber Defense Strategy

Cybersecurity Compass: An Integrated Cyber Defense Strategy 2024-08-02 at 22:17 By Explore how the Cybersecurity Compass can guide various security professionals’ and stakeholders’ decision-making before, during, and after a breach. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Cybersecurity Compass: An Integrated Cyber Defense Strategy Read More »

AI Pulse: Brazil Gets Bold with Meta, Interpol’s Red Flag & more

AI Pulse: Brazil Gets Bold with Meta, Interpol’s Red Flag & more 2024-07-30 at 22:17 By The second edition of AI Pulse is all about AI regulation: what’s coming, why it matters, and what might happen without it. We look at Brazil’s hard não to Meta, how communities are pushing back against AI training data

React to this headline:

Loading spinner

AI Pulse: Brazil Gets Bold with Meta, Interpol’s Red Flag & more Read More »

How to Write a Generative AI Cybersecurity Policy

How to Write a Generative AI Cybersecurity Policy 2024-07-29 at 13:01 By It’s clear that generative AI is a permanent addition to the enterprise IT toolbox. For CISOs, the pressure is on to roll out AI security policies and technologies that can mitigate very real and present risks. This article is an excerpt from Trend

React to this headline:

Loading spinner

How to Write a Generative AI Cybersecurity Policy Read More »

Why NDR is Key to Cyber ‘Pest Control’

Why NDR is Key to Cyber ‘Pest Control’ 2024-07-23 at 19:16 By Intruders are drawn to enterprise IT environments the way mice are attracted to houses. And once either kind of invader is inside, they can be hard to get out. Network detection and response (NDR) lets you trace intruders’ pathways to find out where

React to this headline:

Loading spinner

Why NDR is Key to Cyber ‘Pest Control’ Read More »

Why You Need Network Detection & Response Now

Why You Need Network Detection & Response Now 2024-07-09 at 21:26 By Cybersecurity teams are well-equipped to handle threats to technology assets that they manage. But with unmanaged devices providing ideal spots for attackers to lurk unseen, network detection and response capabilities have become vitally important. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

Why You Need Network Detection & Response Now Read More »

A SANS’s 2024 Threat-Hunting Survey Review

A SANS’s 2024 Threat-Hunting Survey Review 2024-06-05 at 00:16 By In its ninth year, the annual SANS Threat Hunting Survey delves into global organizational practices in threat hunting, shedding light on the challenges and adaptations in the landscape over the past year. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

A SANS’s 2024 Threat-Hunting Survey Review Read More »

It’s Time to Up-Level Your EDR Solution

It’s Time to Up-Level Your EDR Solution 2024-06-03 at 18:01 By You may have EDR, but did you know you can add threat detection and response to improve a SecOps team’s efficiency and outcomes – read more. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

It’s Time to Up-Level Your EDR Solution Read More »

Cybersecurity Decluttered: A Journey to Consolidation

Cybersecurity Decluttered: A Journey to Consolidation 2024-04-12 at 20:46 By Learn how far cybersecurity has come from scattered resources to consolidation the future. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Cybersecurity Decluttered: A Journey to Consolidation Read More »

A Necessary Digital Odyssey of RPA and AI/ML at HUD

A Necessary Digital Odyssey of RPA and AI/ML at HUD 2024-03-13 at 05:57 By Explore two RPA and AI/ML use cases at HUD during the operational challenges of the longest US Government shutdown, a rigid legacy IT environment, and complex federal regulations. This article is an excerpt from Trend Micro Research, News and Perspectives View

React to this headline:

Loading spinner

A Necessary Digital Odyssey of RPA and AI/ML at HUD Read More »

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era 2024-02-21 at 04:31 By Explore the first article in this series about AI, ML, and RPA, which aims to demystify and explore the full spectrum of these core technologies. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era Read More »

What Generative AI Means for Cybersecurity in 2024

What Generative AI Means for Cybersecurity in 2024 2024-02-08 at 19:00 By After a full year of life with ChatGPT cybersecurity experts have a clearer sense of how criminals are using generative AI to enhance attacks – learn what generative AI means for cybersecurity in 2024. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

What Generative AI Means for Cybersecurity in 2024 Read More »

Prevent BEC with AI-Powered Email and Collaboration

Prevent BEC with AI-Powered Email and Collaboration 2024-01-26 at 23:31 By Latest Trend Vision One™ platform integration addresses growing need for streamlined IT and security operations across email and messaging environments. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Prevent BEC with AI-Powered Email and Collaboration Read More »

Reduce Business Email Compromise with Collaboration

Reduce Business Email Compromise with Collaboration 2024-01-18 at 22:16 By Here’s the latest Trend Vision One™ platform integration addressing the growing need for collaboration in business email security space. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Reduce Business Email Compromise with Collaboration Read More »

CVE-2023-46604 (Apache ActiveMQ) Exploited to Infect Systems With Cryptominers and Rootkits

CVE-2023-46604 (Apache ActiveMQ) Exploited to Infect Systems With Cryptominers and Rootkits 20/11/2023 at 12:17 By We uncovered the active exploitation of the Apache ActiveMQ vulnerability CVE-2023-46604 to download and infect Linux systems with the Kinsing malware (also known as h2miner) and cryptocurrency miner. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

CVE-2023-46604 (Apache ActiveMQ) Exploited to Infect Systems With Cryptominers and Rootkits Read More »

Scroll to Top