Trend Micro Research : Web

5 AI Security Takeaways featuring Forrester

5 AI Security Takeaways featuring Forrester 2024-11-14 at 01:04 By Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace. This article is an excerpt from Trend Micro Research, News […]

React to this headline:

Loading spinner

5 AI Security Takeaways featuring Forrester Read More »

SOC Around the Clock: World Tour Survey Findings

SOC Around the Clock: World Tour Survey Findings 2024-11-05 at 05:49 By Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity, from job pressures to the need for more advanced tools. Explore what SOC teams had to say. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

SOC Around the Clock: World Tour Survey Findings Read More »

AI Pulse: Election Deepfakes, Disasters, Scams & more

AI Pulse: Election Deepfakes, Disasters, Scams & more 2024-10-31 at 22:02 By In the final weeks before November’s U.S. election, cybersecurity experts were calling October 2024 the “month of mischief”—a magnet for bad actors looking to disrupt the democratic process through AI-generated misinformation. This issue of AI Pulse looks at what can be done about

React to this headline:

Loading spinner

AI Pulse: Election Deepfakes, Disasters, Scams & more Read More »

5 AI Security Takeaways featuring Forrester

5 AI Security Takeaways featuring Forrester 2024-10-17 at 23:34 By Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace. This article is an excerpt from Trend Micro Research, News

React to this headline:

Loading spinner

5 AI Security Takeaways featuring Forrester Read More »

Cybersecurity Compass: Bridging the Communication Gap

Cybersecurity Compass: Bridging the Communication Gap 2024-09-27 at 05:16 By Discover how to use the Cybersecurity Compass to foster effective conversations about cybersecurity strategy between non-technical and technical audiences, focusing on the phases of before, during, and after a breach. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Cybersecurity Compass: Bridging the Communication Gap Read More »

Cybersecurity Compass: An Integrated Cyber Defense Strategy

Cybersecurity Compass: An Integrated Cyber Defense Strategy 2024-08-02 at 22:17 By Explore how the Cybersecurity Compass can guide various security professionals’ and stakeholders’ decision-making before, during, and after a breach. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Cybersecurity Compass: An Integrated Cyber Defense Strategy Read More »

How to Write a Generative AI Cybersecurity Policy

How to Write a Generative AI Cybersecurity Policy 2024-07-29 at 13:01 By It’s clear that generative AI is a permanent addition to the enterprise IT toolbox. For CISOs, the pressure is on to roll out AI security policies and technologies that can mitigate very real and present risks. This article is an excerpt from Trend

React to this headline:

Loading spinner

How to Write a Generative AI Cybersecurity Policy Read More »

QR Codes: Convenience or Cyberthreat?

QR Codes: Convenience or Cyberthreat? 2024-07-23 at 20:16 By Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing) This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

QR Codes: Convenience or Cyberthreat? Read More »

ISPM & ITDR Synergize for AI-Based Identity Security

ISPM & ITDR Synergize for AI-Based Identity Security 2024-05-22 at 23:31 By In the ever-evolving landscape of cybersecurity, staying ahead of malicious actors requires a multifaceted approach. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

ISPM & ITDR Synergize for AI-Based Identity Security Read More »

AI Auctions: Collectibles, Taylor Swift, Jordan Bots

AI Auctions: Collectibles, Taylor Swift, Jordan Bots 2024-03-06 at 06:48 By Discover the fascinating world of AI, ML, and RPA and their real-world applications including the creation of a custom RPA bot for collecting rare sports memorabilia. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this

React to this headline:

Loading spinner

AI Auctions: Collectibles, Taylor Swift, Jordan Bots Read More »

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era 2024-02-21 at 04:31 By Explore the first article in this series about AI, ML, and RPA, which aims to demystify and explore the full spectrum of these core technologies. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source

React to this headline:

Loading spinner

Decoding Digital Transformation: AI, ML, and RPA in the Modern Era Read More »

What Generative AI Means for Cybersecurity in 2024

What Generative AI Means for Cybersecurity in 2024 2024-02-08 at 19:00 By After a full year of life with ChatGPT cybersecurity experts have a clearer sense of how criminals are using generative AI to enhance attacks – learn what generative AI means for cybersecurity in 2024. This article is an excerpt from Trend Micro Research,

React to this headline:

Loading spinner

What Generative AI Means for Cybersecurity in 2024 Read More »

How the EU Cyber Resilience Act Impacts Manufacturers

How the EU Cyber Resilience Act Impacts Manufacturers 12/12/2023 at 22:01 By EU’s Cyber Resilience Act urges vendors to embrace security-by-design, establishing standards in global tech protocols. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

How the EU Cyber Resilience Act Impacts Manufacturers Read More »

Web Security Expands into Secure Service Edge (SSE)

Web Security Expands into Secure Service Edge (SSE) 09/12/2023 at 03:02 By Trend has been securing web access for over a decade with forward-looking innovation and a global footprint to support our customer’s security strategy. We are committed to our customers’ journey of transforming their current security posture, aligning with Zero Trust principles, and embracing

React to this headline:

Loading spinner

Web Security Expands into Secure Service Edge (SSE) Read More »

TrickBot & Conti Sanctions: Implications for CISOs & Boardrooms

TrickBot & Conti Sanctions: Implications for CISOs & Boardrooms 09/09/2023 at 01:01 By Discover what the increased regulatory risk due to recent US and UK sanctions imposed on TrickBot and Conti cybercriminals mean for CISOs and board members. This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to

React to this headline:

Loading spinner

TrickBot & Conti Sanctions: Implications for CISOs & Boardrooms Read More »

ChatGPT Shared Links and Information Protection: Risks and Measures Organizations Must Understand

ChatGPT Shared Links and Information Protection: Risks and Measures Organizations Must Understand 05/07/2023 at 16:31 By Since its initial release in late 2022, the AI-powered text generation tool known as ChatGPT has been experiencing rapid adoption rates from both organizations and individual users. However, its latest feature, known as Shared Links, comes with the potential

React to this headline:

Loading spinner

ChatGPT Shared Links and Information Protection: Risks and Measures Organizations Must Understand Read More »

Malvertising Used as Entry Vector for BlackCat, Actors Also Leverage SpyBoy Terminator

Malvertising Used as Entry Vector for BlackCat, Actors Also Leverage SpyBoy Terminator 30/06/2023 at 13:34 By We found that malicious actors used malvertising to distribute malware via cloned webpages of legitimate organizations. The distribution involved a webpage of the well-known application WinSCP, an open-source Windows application for file transfer. We were able to identify that

React to this headline:

Loading spinner

Malvertising Used as Entry Vector for BlackCat, Actors Also Leverage SpyBoy Terminator Read More »

Abusing Web Services Using Automated CAPTCHA-Breaking Services and Residential Proxies

Abusing Web Services Using Automated CAPTCHA-Breaking Services and Residential Proxies 25/05/2023 at 11:52 By This blog entry features three case studies that show how malicious actors evade the antispam, antibot, and antiabuse measures of online web services via residential proxies and CAPTCHA-breaking services. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Abusing Web Services Using Automated CAPTCHA-Breaking Services and Residential Proxies Read More »

Inside the 2022 Email Cyber Threat Landscape

Inside the 2022 Email Cyber Threat Landscape 07/05/2023 at 18:25 By Key trends and predictions you should know about This article is an excerpt from Trend Micro Research, News and Perspectives View Original Source React to this headline:

React to this headline:

Loading spinner

Inside the 2022 Email Cyber Threat Landscape Read More »

Scroll to Top