

How to Improve Cybersecurity Awareness and Training
Bill Malik, former Research Director at Gartner, discusses how to leverage the Capability Maturity Model to create an effective awareness program.
Strategic insights, best practices and research reports to help security leaders better understand, communicate, and minimize cyber risk across the enterprise.
Networking IT/OT environments is a bit like walking a tightrope, balancing the pursuit of intelligence and efficiency against the risks of exposing OT systems to the wider world. Trend Micro recently teamed up with global machine tool company Celada to identify specific risks associated with industrial CNC machines—and how to mitigate them.
Bill Malik, former Research Director at Gartner, discusses how to leverage the Capability Maturity Model to create an effective awareness program.
A lot can change in three years. That is how much time has elapsed since the last National Risk Register (NRR) was published by the British government.
Make Cybersecurity Awareness Month a year-long initiative with these four actionable security tips to reduce cyber risk across the attack surface.
What is cybersecurity? Viewed in simple terms, it’s about protecting IT systems and assets from unauthorised access and attack.
Implementing Zero Trust can be difficult due to outdated systems, employee resistance, and cost. Yet, the benefits outweigh the challenges. It is key to use a platform that combines multiple security technologies to simplify IT and risk assessment, proper planning, and getting security buy-in from stakeholders, including your board of directors.
Networking IT/OT environments is a bit like walking a tightrope, balancing the pursuit of intelligence and efficiency against the risks of exposing OT systems to the wider world. Trend Micro recently teamed up with global machine tool company Celada to identify specific risks associated with industrial CNC machines—and how to mitigate them.
Major changes are underway, with new rules for federal agencies and updated requirements for public-private partnerships. We discuss the implementation plans for the strategy's first two pillars: defend critical infrastructure and disrupt and dismantle threat actors.
There are few things more important than protecting the UK’s hospitals, schools and citizens from cyber-threats. That’s why I was delighted to recently join Trend Micro’s UK public sector team. In a fast-moving industry where change is the only constant, Trend’s long track record of delivering success for government clients is something to be celebrated. But there’s plenty of work still to do.
Explore the results of a Sapio Research survey commissioned by Trend Micro about how CISOs and other technology leaders are overcoming today’s biggest challenges.
Overworked CISOs are struggling to deliver the cybersecurity results their organizations expect. Fortunately, there are concrete and practical ways they can make their lives easier—while managing cyber risk effectively.