- What Is Overview
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. The “What Is?” Cybersecurity Library provides quick answers to security-related questions as well as more in-depth information, Trend Micro Research, and industry articles.
What Is Container Security?
Securing containers is a continuous process integrated into your development, operations, and maintenance processes and infrastructures.
What Is XDR?
XDR is cross-layered detection and response. XDR collects and automatically correlates data across multiple security layers – email, endpoint, server, cloud workloads, and network – so threats can be detected faster and security analysts can improve investigation and response times.
What Is Cloud Security?
Cloud security encompasses a broad set of techniques and tactics that secure information and processes from prying eyes and systems.
What Is Zerologon?
Zerologon uses a cryptography weakness to pretend it's something or someone it's not. Get the details of the history and how to prevent yourself from being its next victim.
What Is Phishing?
Phishing has been around since email went mainstream in the early- to mid-90s, and has expanded its reach since the onslaught of social media. Learn about the different types, what to look for, and how to prevent phishing.
What Is Ransomware?
Learn all about this prevalent and pervasive form of malware. Hackers hold the key to decrypting files for a fee, holding the user’s data and system control for ransom.
What Is Network Security?
The protection of all computing resources from availability, confidentiality, and integrity attacks and failures.
What Is Machine Learning?
A form of artificial intelligence (AI) that makes it possible for a system to learn from data iteratively by using various algorithms to describe it and predict outcomes by learning from training data that produces precise models.
What Is Zero Trust?
An architectural approach and goal for network security that assumes that every transaction, entity, and identity is untrusted until trust is established and maintained over time.
What Is Apache Log4J (Log4Shell) Vulnerability?
What you need to know about Log4Shell is a critical flaw found in the widely used Java-based logging library, Apache Log4j.
What Is a Cybersecurity Platform?
Cybersecurity platforms integrate security visibility, analysis, and controls across multiple security layers and data sources while enhancing protection, scalability, and performance.
What Is Cyber Insurance?
Cyber insurance is a type of insurance policy that provides coverage for businesses to shield them from losses as a result of data breaches, cyber attcks, and other liabilities.
What Is Cloud Native?
Cloud-native technologies allow organisations to build and run scalable applications in public, private, and hybrid clouds. Examples include containers, service meshes, microservices, immutable infrastructure, and declarative APIs.
Other Resources