Articles By: Trend Micro

The XDR Payoff: Better Security Posture

As we’re acclimating ourselves to the XDR revolution, many organizations are eager to learn how an approach to extended detection and response has performed amongst their peers.

More Than A Number: Your Risk Score Explained

Developing a resilient security posture requires a thorough and holistic understanding of the amount of risk the systems and applications making up your corporate environment face. To quickly and accurately assess this risk, Trend Micro Vision One™ Risk Insights surfaces continuously updated metrics. This distills complex information into easy-to-understand individual asset risk scores, as well as a company-wide risk index.

From Bounty to Exploit: Cybercriminals Use Crowdsourcing for New Attacks

From articles to hackathons, cybercriminals are resorting to crowdsourcing to find more ways to exploit systems. In this article, we tackle these contests, explore their results, and anticipate their possible impacts on the work of cybersecurity defenders.

Trend Micro 2022 Midyear Cybersecurity Report: Defending The Expanding Attack Surface

In the beginning of 2022, many companies around the world began calling for most, if not all, of their workforce to return to the office on a full-time basis, a phenomenon aptly referred to as “the Great Return.” Meanwhile, some companies embraced permanent hybrid work or remote setups.

The Security Risks Faced By CNC Machines In Industry 4.0

The technological leaps of the Fourth Industrial Revolution may have made production machinery more efficient, but these have also put manufacturers in the crosshairs of cybercriminals. Our research tackles the risks that computer numerical control (CNC) machines now face as they’re integrated into today’s networked factories.

Supply Chain as Kill Chain Security in the Era of Zero Trust

Zero Trust is an “always-on everywhere” approach to security. It is a contrast to traditional legacy trust models in which security is “sometimes present in some cases.” Legacy trust models were a low-cost, high-value approach to increasing an attacker’s efforts, but in an era of attacker automation and supply chain compromise, that is no longer true.

ESG Research Insights Report: The XDR Payoff – Better Security Posture

Organizations that aggregate, correlate, and analyze signals across multiple security controls experience fewer successful attacks, have a better overall security posture, and live with less daily stress on their teams.

MEASURING THE XDR PAYOFF: Hard Data Shows Better Efficacy and Efficiency Improvements

On behalf of Trend Micro, ESG conducted a research survey of 500 security and IT professionals responsible for their organisation’s detection and response strategies, processes, and technologies. The research sought to uncover whether an approach to threat detection and response that aggregates data across many security controls in a highly automated fashion yields security efficacy and efficiency benefits for organizations.