"What Is?" Cybersecurity Library

Quick answers to your cybersecurity questions and links to more in-depth information

The “What Is?” Cybersecurity Library provides quick answers to security-related questions as well as more in-depth information, Trend Micro Research, and industry articles.

Container Security Solutions | Securing Containers

Container security protects containerised apps and infrastructure by enforcing measures against threats across the software supply chain and runtime environment

What Is XDR?

XDR is cross-layered detection and response. XDR collects and automatically correlates data across multiple security layers – email, endpoint, server, cloud workloads, and network – so threats can be detected faster and security analysts can improve investigation and response times.

What Is Cloud Security?

Cloud security encompasses a broad set of techniques and tactics that secure information and processes from prying eyes and systems.

What Is Zerologon?

Zerologon uses a cryptography weakness to pretend it's something or someone it's not. Get the details of the history and how to prevent yourself from being its next victim.

What Is Phishing?

The art of stealing user or corporate information through well-crafted emails that rely on social engineering techniques. The more masterful the attack, the less the user will realize they have been duped.

What Is Ransomware?

Learn all about this prevalent and pervasive form of malware. Hackers hold the key to decrypting files for a fee, holding the user’s data and system control for ransom.

What Is Network Security?

The protection of all computing resources from availability, confidentiality, and integrity attacks and failures.

What Is Machine Learning?

A form of artificial intelligence (AI) that makes it possible for a system to learn from data iteratively by using various algorithms to describe it and predict outcomes by learning from training data that produces precise models.

What Is Zero Trust?

An architectural approach and goal for network security that assumes that every transaction, entity, and identity is untrusted until trust is established and maintained over time.

What Is Apache Log4J (Log4Shell) Vulnerability?

Learn about how the Log4j vulnerability started, how it's evolving and what you can do to be secure against the vulnerability

What Is a Cybersecurity Platform?

Cybersecurity platforms integrate security visibility, analysis, and controls across multiple security layers and data sources while enhancing protection, scalability, and performance.

What Is Cyber Insurance?

Cyber insurance is a type of insurance policy that provides coverage for businesses to shield them from losses as a result of data breaches, cyber attcks, and other liabilities.

What Is Cloud Native?

Cloud-native technologies allow organizations to build and run scalable applications in public, private, and hybrid clouds. Examples include containers, service meshes, microservices, immutable infrastructure, and declarative APIs.

SOAR

SOAR (Security Orchestration, Automation and Response) is a function or solution that automates cyber attack incident response and security operations. Based on rules predefined by the vendor or playbooks defined by the user, SOAR automatically handles work processes when certain conditions are met, reducing the workload of operators.

SIEM

SIEM (Security Information and Event Management) is a solution for cyber security monitoring, detection, and investigation, SIEM collects, manages, and analyzes event logs generated by networks and systems, contributing to early detection of security incidents and prompt response.

What is Penetration Testing?

Learn more about penetration testing and how ethical hackers create attacks to discover new security vulnerabilities through pen tests.

What Is AI?

AI is a set of algorithms and architectures capable of tasks like learning, reasoning, problem-solving, perception, and language understanding.

What is DLP (Data Loss Prevention)?

Data loss prevention (DLP) is a security solution designed to detect and prevent data breaches ensuring that data remains secure within the organization.

What is Doxing?

Learn more with Trend Micro about what doxing is, how to protect yourself against it, the information that the doxers are looking for and the legal implications of doxing

Other resources

Glossary of Terms

Threat Encyclopedia

Security News

Security Reports

Research, News, and Perspectives

Research and Analysis

Enterprise Guides