Newsroom

Research, News, and Perspective

Author: Robert Wortmann (Trend Micro)

The Value of Cyber Insurance: Why It Matters and How to Navigate Its Challenges

As cyber threats become increasingly sophisticated, the demand for cyber insurance has grown significantly. While it primarily serves as a means of transferring financial risk, the true value of cyber insurance extends far beyond monetary protection. It fosters critical conversations about cybersecurity practices, illuminates gaps in IT security, and influences business operations at multiple levels. Here’s a closer look at the role of cyber insurance and how businesses can effectively navigate its complexities.

Nov 21, 2024

Author: Feike Hacquebord (Sr. Threat Researcher), Fernando Mercês (Sr. Threat Researcher)

Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices

In this blog entry, we discuss Water Barghest's exploitation of IoT devices, transforming them into profitable assets through advanced automation and monetization techniques.

Nov 18, 2024

5 AI Security Takeaways featuring Forrester

Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace.

Nov 13, 2024

DevOps Resource Center

Author: Michael Langford (Product Marketing)

AWS Graviton Use Cases

Discover how AWS Graviton’s optimized processors help provide a superior price-performance ratio. Available for AWS-managed services, you’ll gain insight on strategies, use cases, and insight on how to get the most out of AWS Graviton.

Sep 28, 2023

How to Protect Your CI/CD Pipeline

Continuous integration and continuous delivery/deployment (CI/CD) has won over app developers, with enterprise cybersecurity teams on the hook to protect CI/CD pipelines. OWASP’s Top 10 CI/CD Security Risks clarify what to watch for.

Aug 29, 2023

Author: Mike Milner (Director of Cloud Native Technology)

What Can Generative AI do for Hybrid Cloud Security?

As enterprise security operations centers absorb cloud security functions, they face new challenges and require new skills. Generative AI can help by laying a secure cloud foundation and empowering SOC teams to respond effectively when threats arise.

Aug 23, 2023

CISO Resource Center

Author: Lewis Duke (Trend Micro)

Inside Pwn2Own Ireland 2024: The Future of Hacking Enterprise Systems, Servers, and IoT

Following several exciting years in Toronto, the Pwn2Own event is making its way to Trend Micro’s offices in Cork, Ireland, from October 22-25, 2024. The event promises to showcase some of the most advanced and cutting-edge cyberattacks. Each year, security researchers from across the globe gather to exploit vulnerabilities in popular software and devices, pushing the boundaries of cybersecurity. The upcoming event will focus on several key categories of hacks, each targeting a variety of platforms, including enterprise software, industrial control systems, and servers.

Sep 30, 2024

Author: Dustin Childs (Trend Micro)

Pwn2Own Ireland 2024: A New Home, New Challenges, and Cutting-Edge Exploits

Pwn2Own, one of the most anticipated cybersecurity competitions, is back—and this time, it's moving to a new home. After several exciting years in Toronto, the contest is making its way to Trend Micro’s offices in Cork, Ireland, from October 22-25, 2024. The global tradition of Pwn2Own has seen it move from cities like Amsterdam, Tokyo, and Austin, and now, we're excited to bring the action to Cork.

Sep 26, 2024

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
USA
1 (817) 522-7911
Lisiane Lenz
AMEA
(971) 505785061
Funda Cizgenakad
Europe
+44 7876 616246
Lorena Rodriguez
Latin America
+52 55 3067-6000
Kaori Iizumi
Japan
+81-3-5334-3658
Angela Chiang
Taiwan
+ 886 2376 1222

Discover Trend Micro

The history, people, and values behind the company.

Connect with us