AI

Agentic Edge AI: Development Tools and Workflows

30 de octubre de 2025

Trend™ Research inspected agentic edge AI systems and the development tools and workflows they leverage and uncovered an intricate labyrinth that demands robust protection from cyberthreats.

Leer más  

  • 21 de octubre de 2025
    A tokenizer lies at the core of every large language model. When it drifts, whether from unseen flaws or adversarial interference, costs rise and performance drops. We explore this emerging risk, its implications, and the measures to prevent it.
  • 10 de octubre de 2025
    Agentic edge AI offers enhanced advantages, but with this comes cybersecurity challenges. Learn more about agentic edge AI and its architecture, and equip your organization by examining related threats and mitigation strategies for these risks.
  • 13 de agosto de 2025
    Poor secret management in MCP servers can lead to serious consequences, including data breaches and supply chain attacks. This article examines the reality of these unsecure configurations and offers practical recommendations that minimize the chances of exposure.
  • 04 de agosto de 2025
    As large language models (LLMs) become more capable and widely adopted, the risk of unintended or adversarial outputs grows, especially within a security-sensitive context. To identify and mitigate such risks, Trend Micro researchers ran LLM security scans that simulate adversarial attacks.
  • 29 de julio de 2025
    Trend Micro’s State of AI Security report explores how AI’s rapid adoption is transforming both business efficiency and cybercrime methods, highlighting novel threats and strategic defenses to help organizations adapt in an increasingly AI-driven world.
  • 28 de julio de 2025
    As agentic AI systems grow increasingly complex, it becomes clear that this class of applications relies on a multi-layered architecture. Trying to chart such architecture reveals several security risks that could plague each layer. This article investigates the possible scenarios and offers actionable insights to secure each layer and combat such threats.
  • 25 de julio de 2025
    As open-source AI models become foundational to digital infrastructure, hidden backdoors and tampered supply chains pose a growing, under-recognized threat that traditional security tools can fail to detect.
  • 15 de julio de 2025
    Email-based cyber threats are growing more sophisticated, with attackers increasingly using tactics like QR code phishing, known malware variants, and AI-powered impersonation to bypass traditional defenses and target users, data, and systems.
  • 25 de marzo de 2025
    The Trend 2025 Cyber Risk Report sustains our shift towards proactive security. Protecting enterprises is no longer about stopping breaches but is now about staying ahead, making cybersecurity a business enabler. By looking at the 2025 risk landscape, we recognize exposures and understand attacker behavior to be able to implement countermeasures, transforming security from a challenge to a catalyst for innovation and business growth.