Trend Micro y Snyk
amplían significativamente el partnership con tecnología
Colaboración para solucionar riesgos de implementación
del open source

La solución desarrollada conjuntamente facilita la interconexión entre los equipos de operaciones de seguridad
y los de devops

Windows® Mac® AndroidTM iOS new Power Up

Trend Micro nombrado «Campeón»
del canal de ciberseguridad global por
Canalys

La matriz de liderazgo de ciberseguridad global reconoce el compromiso de Trend Micro con el canal

Windows® Mac® AndroidTM iOS new Power Up

Investigación, noticias y perspectivas

Industry 4.0: CNC Machine Security Risks Part 3

This three-part blog series explores the risks associated with CNC machines

Dec 06, 2022

Industry 4.0: CNC Machine Security Risks Part 2

This three-part blog series explores the risks associated with CNC machines

Dec 01, 2022

Industry 4.0: CNC Machine Security Risks Part 1

This three-part blog series explores the risks associated with CNC machines

Nov 29, 2022

Centro de recursos de DevOps

Author: Michael Langford (Product Marketing)

Why Chaos Engineering is a Good Stress Test Strategy

Learn about chaos engineering, a method of resilience testing that intentionally introduces “chaos” into a system to discover vulnerabilities and weaknesses that can be exploited by attackers.

Dec 02, 2022

Author: Michael Langford (Product Marketing)

How the MITRE ATT&CK Framework Enhances Cloud Security

Upgrade your cybersecurity game with MITRE ATT&CK™. Discover how this framework can help you protect your business—now and in the future.

Nov 24, 2022

Author: Duane Seon (Product Marketing)

Will Cloud-Native Network Security Oust Firewalls?

Security threats have already begun to outpace cloud firewalls. It’s a fact. But organizations exploring new cloud-native solution find themselves more prepared to stay resilient. Find out how cloud-native network security’s features and benefits are making this possible.

Nov 16, 2022

Centro de recursos de CISO

Author: Vince Kearns (Cyber Risk Specialist)

Cyber Insurance Policy Underwriting Explained

Cybersecurity insurance is a must have for organizations of any size. John Hennessy, RVP at Cowbell discusses cyber insurance policy underwriting process, market trends, and the key security controls for businesses.

Dec 08, 2022

Cybersecurity Plan: 3 Keys for CISOs

CISOs and security professionals need a cybersecurity plan to succeed. Explore three keys for a winning strategy.

Dec 06, 2022

Author: Greg Young (VP of Cybersecurity, Trend Micro), William Malik (VP, Infrastructure Strategies, Trend Micro)

Top 3 Non-Technical Cybersecurity Trends for 2023

A strong cybersecurity strategy isn’t just about choosing the right tools. Cybersecurity experts Greg Young and William Malik discuss three non-technical cybersecurity trends for 2023 to help security leaders reduce cyber risk across the enterprise attack surface.

Dec 01, 2022

Contactos de los medios

Seleccione su región:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
USA
1 (817) 522-7911
Lisiane Lenz
AMEA
(971) 505785061
Jose Campo
Europe
+34 91 369 70 30
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Japan
+81-3-5334-3658
Angela Chiang
Taiwan
+ 886 2376 1222

Descubra Trend Micro

La historia, las personas y los valores detrás de la empresa.

Conéctese con nosotros