Modern Attack Surface Management for Cloud Teams

Credit to Author: Alifiya Sadikali| Date: Mon, 27 Nov 2023 00:00:00 +0000

Today’s attack surface requires modern processes and security solutions. Explore the tenants of modern attack surface management (ASM) and what Cloud teams need to look for in an ASM solution.

Read more

Implementing Zero Trust: 5 Key Considerations

Credit to Author: Alifiya Sadikali| Date: Tue, 07 Nov 2023 00:00:00 +0000

When implementing a Zero Trust strategy and selecting a solution to safeguard your company against cyber risk, there are many factors to consider. Five key areas include Visibility and Analytics, Automation and Orchestration, Central Management, Analyst Experience, and Pricing Flexibility and Transparency.

Read more

Strategic Tips to Optimize Cybersecurity Consolidation

Credit to Author: Greg Young| Date: Thu, 26 Oct 2023 00:00:00 +0000

Say goodbye to security silos. Organizations are eager to take advantage of cybersecurity consolidation and make their security environments more manageable. Evolving incrementally and adopting a platform that supports third-party integrations are key to reducing cybersecurity complexity.

Read more

Cybersecurity Awareness Month 2023: 4 Actionable Tips

Credit to Author: Greg Young| Date: Tue, 26 Sep 2023 00:00:00 +0000

Make Cybersecurity Awareness Month a year-long initiative with these three actionable security tips to reduce cyber risk across the attack surface.

Read more

Protect CNC Machines in Networked IT/OT Environments

Credit to Author: William Malik| Date: Tue, 19 Sep 2023 00:00:00 +0000

Networking IT/OT environments is a bit like walking a tightrope, balancing the pursuit of intelligence and efficiency against the risks of exposing OT systems to the wider world. Trend Micro recently teamed up with global machine tool company Celada to identify specific risks associated with industrial CNC machines—and how to mitigate them.

Read more

Biden National Cybersecurity Strategy Key Takeaways

Credit to Author: Jon Clay| Date: Fri, 15 Sep 2023 00:00:00 +0000

Major changes are underway, with new rules for federal agencies and updated requirements for public-private partnerships. We discuss the implementation plans for the strategy’s first two pillars: defend critical infrastructure and disrupt and dismantle threat actors.

Read more

IT & OT security: How to Bridge the Gap

Credit to Author: William Malik| Date: Thu, 31 Aug 2023 00:00:00 +0000

Connecting IT and OT environments can give industrial organizations powerful efficiencies, but it also introduces cybersecurity challenges. A new Trend Micro/SANS Institute report gets at the heart of those IT and OT security issues—and how to address them.

Read more

4 Generative AI Security Benefits

Credit to Author: Jon Clay| Date: Tue, 01 Aug 2023 00:00:00 +0000

It may be some time before generative AI security can autonomously mitigate cyber threats, but we’re already seeing early examples of how AI models can strengthen enterprise cybersecurity in powerful and transformative ways.

Read more