Investigación y análisis

Distributed Energy Generation Gateway (In)Security

Distributed energy generation (DEG) is a term used to describe the shift from centralized energy generation, such as power companies, to a source — typically a renewable energy source — closer to the user.

Leer más   

Keeping abreast of today’s threat landscape is non-negotiable. Enterprises, service providers, and the Internet-at-large would benefit in knowing the latest in technology and threats so they can actively secure their data and systems against compromise. Skimming security news provides a high-level idea of what’s going on in the real world, but to build effective security strategies, organizations and individuals need to get a better look of what goes on beyond the surface.

Investigación

Access research papers and articles by our security experts and analysts
Leer más


Últimas actualizaciones

Distributed Energy Generation Gateway (In)Security

Distributed energy generation (DEG) is a term used to describe the shift from centralized energy generation, such as power companies, to a source — typically a renewable energy source — closer to the user.
Leer más

    Informes de seguridad

    Download our latest TrendLabs Security Roundups and Predictions reports
    Leer más


    Últimas actualizaciones

    Stepping Ahead of Risk: Trend Micro 2023 Midyear Cybersecurity Threat Report

    In this year’s Midyear Roundup, we look at the major events in the first half of 2023 and draw a picture of the threat landscape from behaviors and patterns observed in the threat landscape to stay ahead and prepare for risks in the second half of the year.
    Leer más

      Download our latest TrendLabs Security Predictions

      Últimas actualizaciones

      Trend Micro Security Predictions for 2024: Critical Scalability

      2024 is poised to be a hotbed for new challenges in cybersecurity as the economic and political terrains continue to undergo digitization and enterprises increasingly leverage artificial intelligence and machine learning (AI/ML), the cloud, and Web3 technologies. While these innovations are expected to lend a hand to organizations, they also provide opportunities for cybercriminals by promising big returns, more streamlined operations on wider impact zones, and more targeted victims.
      Leer más