Trend Micro and Snyk Significantly
Expand Partnership with Technology
Collaboration to Solve Open Source
Development Risks

Co-developed solution bridges the gap between DevOps and security
operations teams

Windows® Mac® AndroidTM iOS new Power Up

Trend Micro Named a Global
Cybersecurity Channel “Champion” by
Canalys

Global Cybersecurity Leadership Matrix recognises Trend Micro’s commitment to the channel

Windows® Mac® AndroidTM iOS new Power Up

Research, News, and Perspective

Patch CVE-2023-23397 Immediately: What You Need To Know and Do

We break down the basic information of CVE-2023-23397, the zero-day, zero-touch vulnerability that was rated 9.8 on the Common Vulnerability Scoring System (CVSS) scale.

Mar 21, 2023

Author: Kazuhisa Tagaya (Security Expert)

S4x23 Review Part 3: Healthcare Cybersecurity Sessions

This article focuses on the healthcare sector. Over the past two years, the healthcare sector has been in a constant state of emergency due to the COVID-19 pandemic, and as widely reported in the media, it has also been threatened by cyberattacks such as ransomware.

Mar 20, 2023

Making the digital world safer, one Tesla at a time

Contestants gather at Pwn2Own Vancouver to showcase their skills and uncover vulnerabilities

Mar 17, 2023

DevOps Resource Centre

Author: Michael Langford (Product Marketing)

AWS Graviton Use Cases

Discover how AWS Graviton’s optimized processors help provide a superior price-performance ratio. Available for AWS-managed services, you’ll gain insight on strategies, use cases, and insight on how to get the most out of AWS Graviton.

Mar 21, 2023

Policy as Code vs Compliance as Code

Learn how policy as code and compliance as code differ and how they can help prevent policy and compliance issues. Investigate the critical area of compliance where automation is playing an increasingly important role in IT management.

Mar 16, 2023

How to Avoid LDAP Injection Attacks

Discover how to implement preventative measures to avoid dangerous LDAP injection vulnerabilities.

Mar 09, 2023

CISO Resource Centre

Author: Greg Young (VP of Cybersecurity, Trend Micro)

How Your Cybersecurity Strategy Enables Better Business

84% of respondents in a Trend Micro global survey said cyber policies negatively impact employees’ abilities to do jobs in the office. Discover how an effective cybersecurity strategy can enable better business, instead of slowing it down.

Mar 21, 2023

3 Ways to Evolve Your Cybersecurity Operations

To meet the expectations of today’s digital enterprises, cybersecurity operations need to modernise in three key ways: by optimising extended detection and response (XDR), adopting proactive cyber risk management, and moving to a unified security platform.

Mar 16, 2023

ZTNA vs VPN: Secure Remote Work and Access

Explore the drivers behind switching from VPN to Zero Trust Network Access (ZTNA) for any device access from anywhere.

Mar 14, 2023

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
USA
1 (817) 522-7911
Lisiane Lenz
AMEA
(971) 505785061
Funda Cizgenakad
Europe
+44 7876 616246
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Japan
+81-3-5334-3658
Angela Chiang
Taiwan
+ 886 2376 1222

Discover Trend Micro

The history, people, and values behind the company.

  Media Coverage

Stay up-to-date
Get our news RSS.

Connect with us