Articles By: Trend Micro

Three Ways To Evolve Your Security Operations

Both the threat and business landscapes are always changing, but the drastic shifts of recent years have made unprecedented demands of security teams, and the security operations center (SOC) in particular. Making piecemeal or incremental changes to keep up with the latest trends is no longer sufficient. Enabling organizations to meet the needs of their digital transformation—and to face threats […]

Read more ›

SOC Modernization and the Role of XDR

Security operations demand massive scale to collect, process, analyze, and act upon massive amounts of data. Early XDR was anchored to two primary data sources: endpoints and networks. While this was an improvement on disconnected EDR and NDR tools, threat detection and response across enterprise organizations demands a wider aperture, including cloud workloads, threat intelligence feeds, SaaS applications, and identity […]

Read more ›

The XDR Payoff: Better Security Posture

As we’re acclimating ourselves to the XDR revolution, many organizations are eager to learn how an approach to extended detection and response has performed amongst their peers. Register to receive this exclusive ESG report and gain important metrics, studies, and insights on topics such as:• Why organizations that are highly-aligned to XDR experience half as many successful attacks• The true […]

Read more ›

More Than A Number: Your Risk Score Explained

Developing a resilient security posture requires a thorough and holistic understanding of the amount of risk the systems and applications making up your corporate environment face. To quickly and accurately assess this risk, Trend Micro Vision One™ Risk Insights surfaces continuously updated metrics. This distills complex information into easy-to-understand individual asset risk scores, as well as a company-wide risk index.

Read more ›

From Bounty to Exploit: Cybercriminals Use Crowdsourcing for New Attacks

From articles to hackathons, cybercriminals are resorting to crowdsourcing to find more ways to exploit systems. In this article, we tackle these contests, explore their results, and anticipate their possible impacts on the work of cybersecurity defenders.

Read more ›

Trend Micro 2022 Midyear Cybersecurity Report: Defending The Expanding Attack Surface

In the beginning of 2022, many companies around the world began calling for most, if not all, of their workforce to return to the office on a full-time basis, a phenomenon aptly referred to as “the Great Return.” Meanwhile, some companies embraced permanent hybrid work or remote setups. This diffused labor pool, together with a widened digital attack surface, has […]

Read more ›

The Security Risks Faced By CNC Machines In Industry 4.0

The technological leaps of the Fourth Industrial Revolution may have made production machinery more efficient, but these have also put manufacturers in the crosshairs of cybercriminals. Our research tackles the risks that computer numerical control (CNC) machines now face as they’re integrated into today’s networked factories.

Read more ›

Supply Chain as Kill Chain Security in the Era of Zero Trust

Zero Trust is an “always-on everywhere” approach to security. It is a contrast to traditional legacy trust models in which security is “sometimes present in some cases.” Legacy trust models were a low-cost, high-value approach to increasing an attacker’s efforts, but in an era of attacker automation and supply chain compromise, that is no longer true. Legacy trust models are […]

Read more ›