Securing the Power of AI, Wherever You Need It
Credit to Author: Shannon Murphy| Date: Thu, 22 Aug 2024 00:00:00 +0000
Explore how generative AI is transforming cybersecurity and enterprise resilience
Read moreCredit to Author: Shannon Murphy| Date: Thu, 22 Aug 2024 00:00:00 +0000
Explore how generative AI is transforming cybersecurity and enterprise resilience
Read moreCredit to Author: Trent Bessell| Date: Thu, 22 Aug 2024 00:00:00 +0000
Using the Trend Micro Vision One platform, our MDR team was able to quickly identify and contain a Play ransomware intrusion attempt.
Read moreCredit to Author: AI Team| Date: Thu, 15 Aug 2024 00:00:00 +0000
This is the first blog in a series on Rogue AI. Later articles will include technical guidance, case studies and more.
Read moreCredit to Author: Ted Lee| Date: Fri, 09 Aug 2024 00:00:00 +0000
Since late 2022, Earth Baku has broadened its scope from the Indo-Pacific region to Europe, the Middle East, and Africa. Their latest operations demonstrate sophisticated techniques, such as exploiting public-facing applications like IIS servers for initial access and deploying the Godzilla webshell for command and control.
Read moreCredit to Author: Eva Chen| Date: Sun, 04 Aug 2024 00:00:00 +0000
This article by Trend Micro CEO Eva Chen brings focus back to striking the cybersecurity strategies balance between business C-suite and information technology (IT) departments.
Read moreCredit to Author: Juan Pablo Castro| Date: Fri, 02 Aug 2024 00:00:00 +0000
Explore how the Cybersecurity Compass can guide various security professionals’ and stakeholders’ decision-making before, during, and after a breach.
Read moreCredit to Author: Jaromir Horejsi| Date: Thu, 01 Aug 2024 00:00:00 +0000
We uncovered a malvertising campaign where the threat actor hijacks social media pages, renames them to mimic popular AI photo editors, then posts malicious links to fake websites.
Read moreCredit to Author: AI Team| Date: Tue, 30 Jul 2024 00:00:00 +0000
The second edition of AI Pulse is all about AI regulation: what’s coming, why it matters, and what might happen without it. We look at Brazil’s hard não to Meta, how communities are pushing back against AI training data use, Interpol’s warnings about AI deepfakes, and more.
Read moreCredit to Author: Greg Young| Date: Mon, 29 Jul 2024 00:00:00 +0000
It’s clear that generative AI is a permanent addition to the enterprise IT toolbox. For CISOs, the pressure is on to roll out AI security policies and technologies that can mitigate very real and present risks.
Read moreCredit to Author: Sara Atie| Date: Tue, 23 Jul 2024 00:00:00 +0000
Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing)
Read more