보안 운영팀은 Trend Micro Vision One 플랫폼으로 알람 과부하로부터 지원을 받습니다.
새로운 위협 방어 플랫폼은 중앙 집중식 위험 가시성을 제공하고 더 빠른 탐지 및 대응을 위해 알람의 우선 순위를 지정합니다.

Windows® Mac® AndroidTM iOS new Power Up

트렌드마이크로 리서치에 따르면 직원의 39%가 개인 디바이스에서 회사 데이터에 액세스합니다.
인력이 원격으로 유지되므로 기업 데이터 정책을 새로 고쳐야 할 수 있습니다.

Windows® Mac® AndroidTM iOS new Power Up

연구, 뉴스 및 관점

작성자: Feike Hacquebord (Sr. Threat Researcher), Stephen Hilt (Sr. Threat Researcher), Fernando Merces (Sr. Threat Researcher), Lord Alfred Remorin (Sr. Threat Researcher)

Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals

Void Rabisu, a malicious actor believed to be associated with the RomCom backdoor, was thought to be driven by financial gain because of its ransomware attacks. But in this blog entry, we discuss how the use of the RomCom backdoor in recent attacks shows how Void Rabisu's motives seem to have changed since at least October 2022.

May 30, 2023

작성자: Sarah Pearl Camiling (Threat Hunter), Paul John Bardon (Threat Hunter)

New Info Stealer Bandit Stealer Targets Browsers, Wallets

This is an analysis of Bandit Stealer, a new Go-based information-stealing malware capable of evading detection as it targets multiple browsers and cryptocurrency wallets.

May 26, 2023

작성자: Kazuhisa Tagaya (Security Expert)

Health Industry Cybersecurity Best Practices 2023

This blog explains the new resources of health industry cybersecurity practices and landscape analysis which the HHS (U.S. Department of Health and Human Services) released in Apr 2023.

May 25, 2023

DevOps 리소스 센터

When is it time for a cyber hygiene audit?

Cyber hygiene is crucial for keeping your organization safe by limiting security breaches, threats against your IT infrastructure, and more. Read on to learn more about what makes up cyber hygiene, and how to audit its effectiveness.

May 30, 2023

Understanding XPath Injection Vulnerabilities

The ability to trigger XPath queries with user-supplied information introduces the risk of XPath injection attacks. Read on to explore how these attacks work and discover how to keep your XPath queries secure.

May 25, 2023

작성자: Michael Langford (Product Marketing)

Azure vs. AWS Developer Tools Guide

Azure vs. AWS — which should you use for your DevOps environment? Discover the differences, similarities, and use cases to make an informed decision.

May 19, 2023

CISO 리소스 센터

작성자: William Malik (VP, Infrastructure Strategies, Trend Micro)

Moore's Law, Latent Demand, and the Slowing of Cloud Computing

A growing chorus of organizations are slowing their cloud computing and migration. William Malik, Trend Micro’s VP of Infrastructure Strategies, discusses why this is happening, and what it will mean for organizations’ long-term plans.

May 25, 2023

작성자: Chris LaFleur (Manager Threat IR and Forensics)

Against the Clock: Cyber Incident Response Plan

Conventional wisdom says most organizations will experience a cybersecurity breach at some point—if they haven’t already. That makes having a ready-to-launch incident response process crucial when an attack is detected, as this fictionalized scenario shows.

May 24, 2023

작성자: Mike Milner (Head of Product Management, Cloud One)

Accelerating Security Risk Management

In response to the expanding attack surface, Mike Milner, Trend Micro VP of Cloud Technology, explores the role security risk management plays in this new era of cybersecurity and how IT leaders are accelerating innovation.

May 18, 2023

미디어 연락처

지역 선택:

  • 미국
  • AMEA
  • 유럽
  • 라틴 아메리카
  • 일본
  • 대만
Kateri Daniels
미국
1 (817) 522-7911
Lisiane Lenz
AMEA
(971) 505785061
Funda Cizgenakad
유럽
+44 7876 616246
Lorena Rodriguez
라틴 아메리카
+52 55 3067-6000
Kaori Iizumi
일본
+81-3-5334-3658
Angela Chiang
대만
+ 886 2376 1222

트렌드마이크로 탐색

회사 이면의 역사, 사람과 가치

  언론 보도

최신 상태 유지
뉴스 받기 RSS.

연락처