Trend Micro i Snyk Significantly
Rozszerzają współpracę partnerską
w celu wyeliminowania zagrożeń
związanych z rozwojem oprogramowania typu open source

Wspólne rozwiązanie wypełnia lukę między DevOps i
zespołami ds. bezpieczeństwa

Windows® Mac® AndroidTM iOS new Power Up

Trend Micro otrzymuje tytuł
Tytuł Global Cybersecurity Channel „Champion”
od Canalys

Global Cybersecurity Leadership Matrix jest wyrazem uznania dla zaangażowania firmy Trend Micro w rozwój kanału

Windows® Mac® AndroidTM iOS new Power Up

Badania, wiadomości i perspektywy

Author: David Fiser (Threat Researcher), Alfredo Oliveira (Sr. Security Researcher)

Stronger Cloud Security in Azure Functions Using Custom Cloud Container

In this entry, we discuss how developers can use custom cloud container image and the distroless approach to minimize security gaps in Azure Functions.

Sep 29, 2022

Author: Vladimir Kropotov (Sr. Threat Researcher), Fyodor Yarochkin (Sr. Threat Researcher), Craig Gibson (Sr. Threat Researcher), Stephen Hilt (Sr. Threat Researcher)

How Underground Groups Use Stolen Identities and Deepfakes

The growing appearance of deepfake attacks is significantly reshaping the threat landscape. These fakes brings attacks such as business email compromise (BEC) and identity verification bypassing to new levels.

Sep 27, 2022

Author: Sunil Bharti (Senior Threat Researcher)

Atlassian Confluence Vulnerability CVE-2022-26134 Abused For Cryptocurrency Mining, Other Malware

Users are advised to patch immediately: We found exploit samples abusing the Atlassian Confluence vulnerability (CVE-2022-26134) in the wild for malicious cryptocurrency mining.

Sep 21, 2022

Centrum zasobów DevOps

Author: Michael Langford (Product Marketing)

Common Cloud-Native Security Misconfigurations & Fixes

Cloud configuration errors are a major concern for modern DevOps teams, introducing a new attack surface with numerous potential points of vulnerability. Read on to discover some of the most common errors and learn how to resolve them.

Sep 30, 2022

Author: Duane Seon (Product Marketing)

Simplify with Network Security as a Service (NSaaS)

Learn more on how network security as a service (NSaaS) employs the latest technologies to counter unknown threats and detect abnormal behavior before it becomes a direct threat.

Sep 23, 2022

Author: Michael Langford (Product Marketing)

Top 5 CNAPP-Solved Security Challenges

Cloud-native application security solutions consist of various tools, each with its own objective - learn what security challenges CNAPP solves.

Sep 15, 2022

Centrum zasobów CISO

Author: Chris LaFleur (Manager Threat IR and Forensics)

Incident Response Services & Playbooks Guide

63% of c-level executives in the US don’t have an incident response plan yet 50% of organizations experience a cyberattack. Explore incident response services and playbooks to strengthen your cyber defenses.

Sep 29, 2022

Author: Jon Clay (VP, Threat Intelligence), Ed Cabrera (Chief Cybersecurity Officer)

Preventing Cryptocurrency Cyber Extortion

Highly destructive cybercrime is on the rise, and most of it is being funded with anonymous cryptocurrency. Discover cryptocurrency trends and how enterprises can enhance their cybersecurity posture to prevent cyber extortion.

Sep 27, 2022

Author: Jon Clay (VP, Threat Intelligence)

How to Prevent Ransomware as a Service (RaaS) Attacks

Explore key insights on how ransomware as a service (RaaS) operators work and how to prevent ransomware attacks.

Sep 22, 2022

Kontakty dla mediów

Wybierz swój region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
USA
1 (817) 522-7911
Lisiane Lenz
AMEA
(971) 505785061
Anna Falkowska
Europe
+48 22 486 34 50
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Japan
+81-3-5334-3658
Angela Chiang
Taiwan
+ 886 2376 1222

Poznaj Trend Micro

Historia, ludzie i wartości firmy.

Połącz się z nami