보안 운영팀은 Trend Micro Vision One 플랫폼으로 알람 과부하로부터 지원을 받습니다.
새로운 위협 방어 플랫폼은 중앙 집중식 위험 가시성을 제공하고 더 빠른 탐지 및 대응을 위해 알람의 우선 순위를 지정합니다.

Windows® Mac® AndroidTM iOS new Power Up

트렌드마이크로 리서치에 따르면 직원의 39%가 개인 디바이스에서 회사 데이터에 액세스합니다.
인력이 원격으로 유지되므로 기업 데이터 정책을 새로 고쳐야 할 수 있습니다.

Windows® Mac® AndroidTM iOS new Power Up

연구, 뉴스 및 관점

작성자: Nathaniel Morales (Threat Analyst), Earle Maui Earnshaw (Threats Analyst), Don Ovid Ladores (Threats Analyst), Nick Dai (Sr. Threat Researcher), Nathaniel Gregory Ragasa (Threat Analyst)

New Mimic Ransomware Abuses Everything APIs for its Encryption Process

Trend Micro researchers discovered a new ransomware that abuses the APIs of a legitimate tool called Everything, a Windows filename search engine developed by Voidtools that offers quick searching and real-time updates for minimal resource usage.

Jan 26, 2023

작성자: David Fiser (Threat Researcher)

Attacking The Supply Chain: Developer

In this proof of concept, we look into one of several attack vectors that can be abused to attack the supply chain: targeting the developer. With a focus on the local integrated developer environment (IDE), this proof considers the execution of malicious build scripts via injecting commands when the project or build is incorrectly “trusted”.

Jan 25, 2023

작성자: Ieriz Nicolle Gonzalez (Threat Analyst), Paul Pajares (Threats Analyst), Arianne Dela Cruz (Threats Analyst), Warren Sto.Tomas (Sr. Threat Research Engineer)

Vice Society Ransomware Group Targets Manufacturing Companies

In this blog entry, we’d like to highlight our findings on Vice Society, which includes an end-to-end infection diagram that we were able to create using Trend Micro internal telemetry.

Jan 24, 2023

DevOps 리소스 센터

Dependency Mapping for DevSecOps

Discover the importance of dependency mapping and best practices for successful dependency management

Jan 25, 2023

TLS Connection Cryptographic Protocol Vulnerabilities

TLS is the backbone of encryption and key to ensuring data integrity, but its misconfiguration can leave your system vulnerable. Read on to discover how to secure your TLS connection and arm your organization against malicious attacks.

Jan 20, 2023

작성자: Michael Langford (Product Marketing)

An in-depth HTTP Strict Transport Security Tutorial

HSTS is an Internet standard and policy that tells the browser to only interact with a website using a secure HTTPS connection. Check out this article to learn how to leverage the security of your website and customers’ data and the security benefits you’ll gain from doing so.

Jan 11, 2023

CISO 리소스 센터

Cybersecurity Posture & Insurance Outlook with Advisen

Trend Micro’s Eric Skinner, and Advisen, an insurance data and analytics company, discuss the current threat landscape, cyber risk management, and how vendors and cyber insurers can champion enhanced cybersecurity posture.

Jan 26, 2023

작성자: Jon Clay (VP, Threat Intelligence)

Ransomware Recovery Plan for 2023

It’s important to defend against ransomware attacks, but is your organization prepared to deal with the consequences of a breach? Find out how to plan an effective ransomware recovery strategy.

Jan 24, 2023

작성자: Greg Young (VP of Cybersecurity, Trend Micro)

What is Business Attack Surface Management?

Explore how businesses can make internal and external attack surface management (ASM) actionable.

Jan 19, 2023

미디어 연락처

지역 선택:

  • 미국
  • AMEA
  • 유럽
  • 라틴 아메리카
  • 일본
  • 대만
Kateri Daniels
미국
1 (817) 522-7911
Lisiane Lenz
AMEA
(971) 505785061
Funda Cizgenakad
유럽
+44 7876 616246
Lorena Rodriguez
라틴 아메리카
+52 55 3067-6000
Kaori Iizumi
일본
+81-3-5334-3658
Angela Chiang
대만
+ 886 2376 1222

트렌드마이크로 탐색

회사 이면의 역사, 사람과 가치

  언론 보도

최신 상태 유지
뉴스 받기 RSS.

연락처