Trend Micro Vision One 平台協助資訊保安營運團隊降低警示負荷
全新威脅防禦平台提供中央化風險視野與警示優先次序過濾,加快偵測及回應速度

Windows® Mac® AndroidTM iOS new Power Up

趨勢科技研究發現 39% 員工以私人裝置存取公司資料
在團隊維持遙距工作情況下,機構須重新檢視公司資料政策

Windows® Mac® AndroidTM iOS new Power Up

研究、新聞及觀點

Author: Vickie Su (Threats Analyst), Nick Dai (Sr. Threat Researcher), Sunny Lu (Threats Analyst)

Pack it Secretly: Earth Preta’s Updated Stealthy Strategies

Earth Preta has actively been changing its tools, tactics, and procedures (TTPs) to bypass security solutions. In this blog entry, we will introduce and analyze the tools and malware used by the threat actor in its most recent campaigns.

Mar 23, 2023

Patch CVE-2023-23397 Immediately: What You Need To Know and Do

We break down the basic information of CVE-2023-23397, the zero-day, zero-touch vulnerability that was rated 9.8 on the Common Vulnerability Scoring System (CVSS) scale.

Mar 21, 2023

Author: Kazuhisa Tagaya (Security Expert)

S4x23 Review Part 3: Healthcare Cybersecurity Sessions

This article focuses on the healthcare sector. Over the past two years, the healthcare sector has been in a constant state of emergency due to the COVID-19 pandemic, and as widely reported in the media, it has also been threatened by cyberattacks such as ransomware.

Mar 20, 2023

DevOps 資源中心

Author: Hoa Nguyen (AWS Community Builder)

4 Tips for Better AWS Cloud Workload Security

Discover the challenges of AWS cloud workload security and the various technologies that can alleviate them.

Mar 23, 2023

Author: Michael Langford (Product Marketing)

AWS Graviton Use Cases

Discover how AWS Graviton’s optimized processors help provide a superior price-performance ratio. Available for AWS-managed services, you’ll gain insight on strategies, use cases, and insight on how to get the most out of AWS Graviton.

Mar 21, 2023

Policy as Code vs Compliance as Code

Learn how policy as code and compliance as code differ and how they can help prevent policy and compliance issues. Investigate the critical area of compliance where automation is playing an increasingly important role in IT management.

Mar 16, 2023

CISO 資源中心

Author: Jon Clay (VP, Threat Intelligence)

Prevent Ransomware with Cybersecurity Monitoring

Misconfigured cloud and IT assets open the door to a wide range of cyber risks. Automated, continuous cybersecurity monitoring lets organizations watch accounts and systems for exposures in real time and maintain strong attack surface risk management.

Mar 23, 2023

Author: Greg Young (VP of Cybersecurity, Trend Micro)

How Your Cybersecurity Strategy Enables Better Business

84% of respondents in a Trend Micro global survey said cyber policies negatively impact employees’ abilities to do jobs in the office. Discover how an effective cybersecurity strategy can enable better business, instead of slowing it down.

Mar 21, 2023

3 Ways to Evolve Your Cybersecurity Operations

To meet the expectations of today’s digital enterprises, cybersecurity operations need to modernize in three key ways: by optimizing extended detection and response (XDR), adopting proactive cyber risk management, and moving to a unified security platform.

Mar 16, 2023

傳媒聯絡人

選擇您的地區:

  • USA
  • 亞洲、中東及非洲地區
  • 歐洲
  • 拉丁美洲
  • 日本
  • 台灣
Kateri Daniels
USA
+1 817 522 7911
Lisiane Lenz
亞洲、中東及非洲地區
+971 5057 85061
Funda Cizgenakad
歐洲
+44 7876 616246
Lorena Rodriguez
拉丁美洲
+52 55 3067-6000
Kaori Iizumi
日本
+81-3-5334-3658
江婷
台灣
+ 886 2376 1222

趨勢科技

我們的歷史、團隊及公司背後的核心價值。

  媒體報導

保持消息靈通
時刻取得最新資訊 RSS。

聯絡我們