"What Is?" Cybersecurity Library

Quick answers to your cybersecurity questions and links to more in-depth information

The “What Is?” Cybersecurity Library provides quick answers to security-related questions as well as more in-depth information, Trend Micro Research, and industry articles.

AI is a set of algorithms and architectures capable of tasks like learning, reasoning, problem-solving, perception, and language understanding.

A detailed explanation of the attack surface: what it is, what it means for cybersecurity, and how to protect it.

Learn about how the Log4j vulnerability started, how it's evolving and what you can do to be secure against the vulnerability

Cybersecurity platforms integrate security visibility, analysis, and controls across multiple security layers and data sources while enhancing protection, scalability, and performance.

AI is a set of algorithms and architectures capable of tasks like learning, reasoning, problem-solving, perception, and language understanding.

Learn all about cloud security including what it is, how it works, why it’s important, and some common risks, benefits, trends, and best practices.

Securing containers is a continuous process integrated into your development, operations, and maintenance processes and infrastructures.

Cyber insurance is a type of insurance policy that provides coverage for businesses to shield them from losses as a result of data breaches, cyber attcks, and other liabilities.

From Fortune 500 firms to global enterprises, no organization is too large to fall victim to a data breach. The cost? Financial loss, reputational damage, and regulatory fallout.

Explore the extended detection and response (XDR) meaning, how it works, challenges and use cases, comparisons to other technologies, and more:

The protection of all computing resources from availability, confidentiality, and integrity attacks and failures.

Learn more about penetration testing and how ethical hackers create attacks to discover new security vulnerabilities through pen tests.

The art of stealing user or corporate information through well-crafted emails that rely on social engineering techniques. The more masterful the attack, the less the user will realize they have been duped.

Learn why proactive security is important to cybersecurity and how to implement proactive security approaches.

Learn all about this prevalent and pervasive form of malware. Hackers hold the key to decrypting files for a fee, holding the user’s data and system control for ransom.

Learn the social engineering definition, how it works, and how to defend against deception-based cyber attacks and fraud.

A detailed overview of threat detection and response, including what it is, why it’s important for cybersecurity, and how it can protect your organization.

Learn the VPN meaning, how VPN internet connections enhance security, and why businesses rely on them for privacy, remote access, and data protection.

An architectural approach and goal for network security that assumes that every transaction, entity, and identity is untrusted until trust is established and maintained over time.

Zerologon uses a cryptography weakness to pretend it's something or someone it's not. Get the details of the history and how to prevent yourself from being its next victim.

Other resources

Glossary of Terms

Threat Encyclopedia

Security News

Security Reports

Research, News, and Perspectives

Research and Analysis

Enterprise Guides