Protect CNC Machines in Networked IT/OT Environments

Credit to Author: William Malik| Date: Tue, 19 Sep 2023 00:00:00 +0000

Networking IT/OT environments is a bit like walking a tightrope, balancing the pursuit of intelligence and efficiency against the risks of exposing OT systems to the wider world. Trend Micro recently teamed up with global machine tool company Celada to identify specific risks associated with industrial CNC machines—and how to mitigate them.

Read more

Biden National Cybersecurity Strategy Key Takeaways

Credit to Author: Jon Clay| Date: Fri, 15 Sep 2023 00:00:00 +0000

Major changes are underway, with new rules for federal agencies and updated requirements for public-private partnerships. We discuss the implementation plans for the strategy’s first two pillars: defend critical infrastructure and disrupt and dismantle threat actors.

Read more

4 Generative AI Security Benefits

Credit to Author: Jon Clay| Date: Tue, 01 Aug 2023 00:00:00 +0000

It may be some time before generative AI security can autonomously mitigate cyber threats, but we’re already seeing early examples of how AI models can strengthen enterprise cybersecurity in powerful and transformative ways.

Read more

How a Cyber Security Platform Addresses the 3 “S”

Credit to Author: Yohei Ishihara| Date: Thu, 27 Jul 2023 00:00:00 +0000

Explore how a security platform can help organizations address the 3 “S” impacting cybersecurity: stealth, sustainability, and shortage.

Read more

Security Patch Management Strengthens Ransomware Defense

Credit to Author: Jon Clay| Date: Thu, 20 Jul 2023 00:00:00 +0000

With thousands of applications to manage, enterprises need an effective way to prioritize software security patches. That calls for a contextualized, risk-based approach and good overall attack surface risk management.

Read more

Guide to Operationalizing Zero Trust

Credit to Author: Alifiya Sadikali| Date: Tue, 11 Jul 2023 00:00:00 +0000

Zero Trust is no longer a buzzword but an essential element in enterprise security architecture. Operating on the ‘never trust, always verify’ principle, Zero Trust plays a vital role in protecting enterprise assets and data. However, operationalizing Zero Trust can be challenging for businesses.

Read more

Cybersecurity Awareness Training to Fight Ransomware

Credit to Author: Jon Clay| Date: Thu, 06 Jul 2023 00:00:00 +0000

Advanced technologies allow organizations to discover, assess and mitigate cyber threats like ransomware. But truly strong cybersecurity also requires a threat-aware workforce—prompting more and more enterprises to focus on cybersecurity awareness training and testing.

Read more

How to Write a Cybersecurity Policy for Generative AI

Credit to Author: Greg Young| Date: Thu, 22 Jun 2023 00:00:00 +0000

Just months after hitting the scene, generative AI already seems like it will become a permanent addition to the enterprise IT toolbox. For CISOs, the pressure is on to roll out AI security policies and technologies that can mitigate very real and present risks.

Read more