Trend Micro threat intelligence heavily contributed to the development of ATT&CK for Containers
Continue readingTag: Trend Micro
Vijendra Katiyar to lead Trend Micro in India, SAARC
With this appointment, Trend Micro has elevated Katiyar from the position of Director – Enterprise Business to the leadership role of Country Manager.
Continue readingSmart factory cyber attacks hit 61% of manufacturers
As many as 61% of manufacturers have experienced smart factory cyber attacks and these incidents have shut production for days.
Continue readingTrend Micro detected 119,000 cyber threats per minute in 2020
Trend Micro detected 119,000 cyber threats per minute in 2020 as home workers and infrastructure came under new pressure from attacks.
Continue readingTrend Micro’s Vision One threat defense platform
It offers extended detection and response (XDR)’s core capabilities to security teams with visibility and quick response.
Continue readingBoardroom engagement must for driving cybersecurity
A Trend Micro sponsored study by the Enterprise Strategy Group revealed that there exist systemic challenges with security integration into business processes.
Continue readingTrend Micro turns as launch partner for AWS firewall
As a launch partner, Trend Micro has integrated managed threat intelligence feeds from its cloud security solution to enable superior protection in line with this new AWS managed firewall service.
Continue readingHome networks – a critical launchpad for attacks in 2021
Cybercriminals in 2021 will particularly look to home networks as a critical launch pad to compromising corporate IT and IoT networks, according to Trend Micro’s predictions report Turning the Tide.
Continue readingTrend Micro to launch its local data lake in India
Trend Micro’s first local XDR data lake in India will be launched in December this year and will be available to its key partners and SOC (Security Operations Centre) solution providers.
Continue readingOn-premise and cloud-based servers exploited
While cryptomining may not cause disruption or financial losses on its own, mining software is usually deployed to monetize compromised servers that are sitting idle while criminals plot larger money-making schemes.
Continue reading