Cybersecurity Awareness Month 2023: 4 Actionable Tips

Credit to Author: Greg Young| Date: Tue, 26 Sep 2023 00:00:00 +0000

Make Cybersecurity Awareness Month a year-long initiative with these three actionable security tips to reduce cyber risk across the attack surface.

Read more

Protect CNC Machines in Networked IT/OT Environments

Credit to Author: William Malik| Date: Tue, 19 Sep 2023 00:00:00 +0000

Networking IT/OT environments is a bit like walking a tightrope, balancing the pursuit of intelligence and efficiency against the risks of exposing OT systems to the wider world. Trend Micro recently teamed up with global machine tool company Celada to identify specific risks associated with industrial CNC machines—and how to mitigate them.

Read more

Biden National Cybersecurity Strategy Key Takeaways

Credit to Author: Jon Clay| Date: Fri, 15 Sep 2023 00:00:00 +0000

Major changes are underway, with new rules for federal agencies and updated requirements for public-private partnerships. We discuss the implementation plans for the strategy’s first two pillars: defend critical infrastructure and disrupt and dismantle threat actors.

Read more

4 Generative AI Security Benefits

Credit to Author: Jon Clay| Date: Tue, 01 Aug 2023 00:00:00 +0000

It may be some time before generative AI security can autonomously mitigate cyber threats, but we’re already seeing early examples of how AI models can strengthen enterprise cybersecurity in powerful and transformative ways.

Read more

How a Cyber Security Platform Addresses the 3 “S”

Credit to Author: Yohei Ishihara| Date: Thu, 27 Jul 2023 00:00:00 +0000

Explore how a security platform can help organizations address the 3 “S” impacting cybersecurity: stealth, sustainability, and shortage.

Read more

Security Patch Management Strengthens Ransomware Defense

Credit to Author: Jon Clay| Date: Thu, 20 Jul 2023 00:00:00 +0000

With thousands of applications to manage, enterprises need an effective way to prioritize software security patches. That calls for a contextualized, risk-based approach and good overall attack surface risk management.

Read more

Guide to Operationalizing Zero Trust

Credit to Author: Alifiya Sadikali| Date: Tue, 11 Jul 2023 00:00:00 +0000

Zero Trust is no longer a buzzword but an essential element in enterprise security architecture. Operating on the ‘never trust, always verify’ principle, Zero Trust plays a vital role in protecting enterprise assets and data. However, operationalizing Zero Trust can be challenging for businesses.

Read more

Cybersecurity Awareness Training to Fight Ransomware

Credit to Author: Jon Clay| Date: Thu, 06 Jul 2023 00:00:00 +0000

Advanced technologies allow organizations to discover, assess and mitigate cyber threats like ransomware. But truly strong cybersecurity also requires a threat-aware workforce—prompting more and more enterprises to focus on cybersecurity awareness training and testing.

Read more