Trend Micro Vision One 平台協助資訊保安營運團隊降低警示負荷

Windows® Mac® AndroidTM iOS new Power Up

趨勢科技研究發現 39% 員工以私人裝置存取公司資料

Windows® Mac® AndroidTM iOS new Power Up


Author: Vickie Su (Threats Analyst), Nick Dai (Sr. Threat Researcher), Sunny Lu (Threats Analyst)

Pack it Secretly: Earth Preta’s Updated Stealthy Strategies

Earth Preta has actively been changing its tools, tactics, and procedures (TTPs) to bypass security solutions. In this blog entry, we will introduce and analyze the tools and malware used by the threat actor in its most recent campaigns.

Mar 23, 2023

Patch CVE-2023-23397 Immediately: What You Need To Know and Do

We break down the basic information of CVE-2023-23397, the zero-day, zero-touch vulnerability that was rated 9.8 on the Common Vulnerability Scoring System (CVSS) scale.

Mar 21, 2023

Author: Kazuhisa Tagaya (Security Expert)

S4x23 Review Part 3: Healthcare Cybersecurity Sessions

This article focuses on the healthcare sector. Over the past two years, the healthcare sector has been in a constant state of emergency due to the COVID-19 pandemic, and as widely reported in the media, it has also been threatened by cyberattacks such as ransomware.

Mar 20, 2023

DevOps 資源中心

Author: Hoa Nguyen (AWS Community Builder)

4 Tips for Better AWS Cloud Workload Security

Discover the challenges of AWS cloud workload security and the various technologies that can alleviate them.

Mar 23, 2023

Author: Michael Langford (Product Marketing)

AWS Graviton Use Cases

Discover how AWS Graviton’s optimized processors help provide a superior price-performance ratio. Available for AWS-managed services, you’ll gain insight on strategies, use cases, and insight on how to get the most out of AWS Graviton.

Mar 21, 2023

Policy as Code vs Compliance as Code

Learn how policy as code and compliance as code differ and how they can help prevent policy and compliance issues. Investigate the critical area of compliance where automation is playing an increasingly important role in IT management.

Mar 16, 2023

CISO 資源中心

Author: Jon Clay (VP, Threat Intelligence)

Prevent Ransomware with Cybersecurity Monitoring

Misconfigured cloud and IT assets open the door to a wide range of cyber risks. Automated, continuous cybersecurity monitoring lets organizations watch accounts and systems for exposures in real time and maintain strong attack surface risk management.

Mar 23, 2023

Author: Greg Young (VP of Cybersecurity, Trend Micro)

How Your Cybersecurity Strategy Enables Better Business

84% of respondents in a Trend Micro global survey said cyber policies negatively impact employees’ abilities to do jobs in the office. Discover how an effective cybersecurity strategy can enable better business, instead of slowing it down.

Mar 21, 2023

3 Ways to Evolve Your Cybersecurity Operations

To meet the expectations of today’s digital enterprises, cybersecurity operations need to modernize in three key ways: by optimizing extended detection and response (XDR), adopting proactive cyber risk management, and moving to a unified security platform.

Mar 16, 2023



  • USA
  • 亞洲、中東及非洲地區
  • 歐洲
  • 拉丁美洲
  • 日本
  • 台灣
Kateri Daniels
+1 817 522 7911
Lisiane Lenz
+971 5057 85061
Funda Cizgenakad
+44 7876 616246
Lorena Rodriguez
+52 55 3067-6000
Kaori Iizumi
+ 886 2376 1222




時刻取得最新資訊 RSS。