Vision-One-Plattform von Trend Micro
entlastet Security-Operations-Teams (SOCs)

Neue Plattform zur Bedrohungsabwehr bietet zentrale Risikotransparenz
und priorisiert Alarme für schnellere Detection and Response

Windows® Mac® AndroidTM iOS new Power Up

Schulungen, Cloud Security und XDR
sind entscheidend für die Cybersicherheit
im Jahr 2021

Trend Micro prognostiziert, dass Remote- und Cloud-basierte Systeme
im nächsten Jahr rücksichtslos ins Visier genommen werden

Windows® Mac® AndroidTM iOS new Power Up

Research, Neuigkeiten und Perspektiven

Autor: Kazuhisa Tagaya (Security Expert)

S4x23 Review Part 4: Cybersecurity for Industrial IoT

In this fourth article, I introduce the discussion related to Industrial IoT, that is involved challenges to adopt cybersecurity strategy into modernizing environment.

Mar 31, 2023

Autor: Qi Sun (Mobile Threats Analyst), Luis Magisa (Threats Analyst)

Mac Malware MacStealer Spreads as Fake P2E Apps

We detected Mac malware MacStealer spreading via websites, social media, and messaging platforms Twitter, Discord, and Telegram. Cybercriminals lure victims to download it by plagiarizing legitimate play-to-earn (P2E) apps’ images and offering jobs as beta testers.

Mar 30, 2023

Autor: Jon Clay (VP, Threat Intelligence)

Fighting mercenaries with the Cybersecurity Tech Accord

Trend Micro co-Authors Cyber Mercenary Principles to help guide the technology industry and others in dealing with the growing market of cyber mercenaries.

Mar 30, 2023

DevOps Resource Center

Best Practices for Secure Remote Development

Discover the best practices for cybersecurity that developers can implement when working remotely. These will secure your system against security breaches and threats like malware, phishing, data theft, ransomware, and spyware.

Mar 28, 2023

Autor: Hoa Nguyen (AWS Community Builder)

4 Tips for Better AWS Cloud Workload Security

Discover the challenges of AWS cloud workload security and the various technologies that can alleviate them.

Mar 23, 2023

Autor: Michael Langford (Product Marketing)

AWS Graviton Use Cases

Discover how AWS Graviton’s optimized processors help provide a superior price-performance ratio. Available for AWS-managed services, you’ll gain insight on strategies, use cases, and insight on how to get the most out of AWS Graviton.

Mar 21, 2023

CISO Resource Center

Autor: Jon Clay (VP, Threat Intelligence)

3 Shifts in the Cyber Threat Landscape

The threat landscape is always changing and these three major shifts are already underway. Learn to recognize them to protect your organization from cyber threats.

Mar 30, 2023

Autor: Greg Young (VP of Cybersecurity, Trend Micro)

Bay Area Bank Collapse and the Cybersecurity Impact

Greg Young, VP of Cybersecurity and CorpDev, discusses what the second-largest bank collapse in U.S. history means for cybersecurity.

Mar 28, 2023

Autor: Jon Clay (VP, Threat Intelligence)

Prevent Ransomware with Cybersecurity Monitoring

Misconfigured cloud and IT assets open the door to a wide range of cyber risks. Automated, continuous cybersecurity monitoring lets organizations watch accounts and systems for exposures in real time and maintain strong attack surface risk management.

Mar 23, 2023

Medienkontakte

Wählen Sie Ihre Region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
USA
1 (817) 522-7911
Lisiane Lenz
AMEA
(971) 505785061
Tobias Grabitz
Europe
+49 (0) 170 144 23 68
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Japan
+81-3-5334-3658
Angela Chiang
Taiwan
+ 886 2376 1222

Entdecken Sie Trend Micro

Die Geschichte, die Mitarbeiter und die Werte des Unternehmens

Kontaktieren Sie Trend Micro