Content has been added to your Folio

CISO Resource Center

Strategic insights, best practices and research reports to help security leaders better understand, communicate, and minimize cyber risk across the enterprise.

Add Filters
Filter by:
Strategien für das Management der Angriffsoberfläche
Risk Management

Strategien für das Management der Angriffsoberfläche

Sicherheitsteams müssen Strategien und Prozeduren für das Risikomanagement überarbeiten. Wir erklären die Verteidigung über die drei Phasen des Lebenszyklus von Risiken für die Angriffsfläche hinweg und zeigen die Bedeutung von XDR und Zero Trust auf.

May 11, 2023
Cloud

Moore's Law, Latent Demand, and the Slowing of Cloud Computing

A growing chorus of organizations are slowing their cloud computing and migration. William Malik, Trend Micro’s VP of Infrastructure Strategies, discusses why this is happening, and what it will mean for organizations’ long-term plans.

Expert Perspective May 25, 2023

Save to Folio

Expert Perspective May 25, 2023

Save to Folio

Risk Management

Against the Clock: Cyber Incident Response Plan

Conventional wisdom says most organizations will experience a cybersecurity breach at some point—if they haven’t already. That makes having a ready-to-launch incident response process crucial when an attack is detected, as this fictionalized scenario shows.

Expert Perspective May 24, 2023

Save to Folio

Expert Perspective May 24, 2023

Save to Folio

Risk Management

Accelerating Security Risk Management

In response to the expanding attack surface, Mike Milner, Trend Micro VP of Cloud Technology, explores the role security risk management plays in this new era of cybersecurity and how IT leaders are accelerating innovation.

Expert Perspective May 18, 2023

Save to Folio

Expert Perspective May 18, 2023

Save to Folio

Digital Transformation

IT-Security ohne SaaS ist wie Harakiri

Security-as-a-Service aus der Cloud bietet Unternehmen zahlreiche Vorteile, darunter modernste Technologien und automatische Updates.

Expert Perspective May 17, 2023

Save to Folio

Expert Perspective May 17, 2023

Save to Folio

Risk Management

Cyber Risk Management in 2023: The People Element

Explore the latest findings from Trend Micro’s Cyber Risk Index (2H’2022) and discover how to enhance cybersecurity risk management across the digital attack surface.

Expert Perspective May 16, 2023

Save to Folio

Expert Perspective May 16, 2023

Save to Folio

Manage Cyber Risk with a Platform Approach

Discover how a platform approach can best assist and support security operations teams with a cyber risk management so you can be more resilient with less resources.

Expert Perspective May 11, 2023

Save to Folio

Expert Perspective May 11, 2023

Save to Folio

Risk Management

Strategien für das Management der Angriffsoberfläche

Sicherheitsteams müssen Strategien und Prozeduren für das Risikomanagement überarbeiten. Wir erklären die Verteidigung über die drei Phasen des Lebenszyklus von Risiken für die Angriffsfläche hinweg und zeigen die Bedeutung von XDR und Zero Trust auf.

Expert Perspective May 11, 2023

Save to Folio

Expert Perspective May 11, 2023

Save to Folio

Detection and Response

Data Exfiltration Prevention with Zero Trust

Data exposure from SaaS and cloud applications is an increasing risk factor facing businesses today. Discover how SASE capabilities can help prevent data exfiltration, achieve zero trust, and reduce cyber risk across the attack surface.

Expert Perspective May 09, 2023

Save to Folio

Expert Perspective May 09, 2023

Save to Folio

Ransomware

To fight cyber extortion and ransomware, shift left

How can organizations defend themselves more effectively against ransomware and other forms of cyber extortion? By “shifting left” and adopting proactive cybersecurity strategies to detect attacks sooner, mitigating breaches before they cause harm.

Expert Perspective May 04, 2023

Save to Folio

Expert Perspective May 04, 2023

Save to Folio

Risk Management

To Keep Up With Cybersecurity Laws, Go 'Federal First'

With new cybersecurity laws and regulations rolling out, the best way to maintain broad compliance is to align with the most stringent frameworks. In the U.S., that means taking a ‘federal first’ approach—conforming to the highest security requirements of the United States federal government.

Expert Perspective May 02, 2023

Save to Folio

Expert Perspective May 02, 2023

Save to Folio