Trend Micro and Snyk Significantly
Expand Partnership with Technology
Collaboration to Solve Open Source
Development Risks

Co-developed solution bridges the gap between DevOps and security
operations teams

Windows® Mac® AndroidTM iOS new Power Up

Trend Micro Named a Global
Cybersecurity Channel “Champion” by
Canalys

Global Cybersecurity Leadership Matrix recognizes Trend Micro’s commitment to the channel

Windows® Mac® AndroidTM iOS new Power Up

Research, News, and Perspective

Author: Alifiya Sadikali (Zero Trust Advocate)

The Journey to Zero Trust with Industry Frameworks

Discover the core principles and frameworks of Zero Trust, NIST 800-207 guidelines, and best practices when implementing CISA’s Zero Trust Maturity Model.

Aug 09, 2023

Cybersecurity Threat 1H 2023 Brief with Generative AI

How generative AI influenced threat trends in 1H 2023

Aug 08, 2023

Author: Don Ovid Ladores (Threats Analyst), Nathaniel Morales (Threat Analyst)

TargetCompany Ransomware Abuses FUD Obfuscator Packers

In this entry, we detail our analysis of how the TargetCompany ransomware abused an iteration of fully undetectable (FUD) obfuscator engine BatCloak to infect vulnerable systems.

Aug 07, 2023

DevOps Resource Center

Author: Melissa Clow (Cloud Advocate)

Leverage the AWS Sustainability Pillar to Minimize Environmental Impact

One of the key pillars of the AWS Well-Architected Framework (WAF) is sustainability: the idea that cloud applications should be designed to minimize their environmental impact. Gain insight into the WAF sustainability pillar and discover best practices for architecting your cloud applications to improve sustainability.

Aug 08, 2023

Author: Melanie Tafelski (Cloud Advocate)

7 Container Security Best Practices For Better Apps

Explore how to implement 7 container security best practices within a CI/CD pipeline built with tools from Amazon Web Services (AWS).

Aug 03, 2023

Author: Melissa Clow (Cloud Advocate)

How to Leverage the AWS Cost Optimization Pillar

Explore the Cost Optimization pillar of the AWS Well-Architected Framework and gain best practices for designing processes that make it possible to go to market and optimize costs early on.

Aug 01, 2023

CISO Resource Center

Author: Alifiya Sadikali (Zero Trust Advocate)

The Journey to Zero Trust with Industry Frameworks

Discover the core principles and frameworks of Zero Trust, NIST 800-207 guidelines, and best practices when implementing CISA’s Zero Trust Maturity Model.

Aug 09, 2023

Author: Vince Kearns (Cyber Risk Specialist)

Lower Data Breach Insurance Costs with These Tips

The changing attack landscape has resulted in the hardening of the data breach insurance market. Gain insight into how implementing security controls can reduce the mean time to detect and control the costliness of an attack.

Aug 08, 2023

Author: Greg Young (VP of Cybersecurity, Trend Micro)

New SEC Cybersecurity Rules: What You Need to Know

The US Securities and Exchange Commission (SEC) recently adopted rules regarding mandatory cybersecurity disclosure. Explore what this announcement means for you and your organization.

Aug 03, 2023

Media Contacts

Pick your region:

  • USA
  • AMEA
  • Europe
  • Latin America
  • Japan
  • Taiwan
Kateri Daniels
USA
media_relations@trendmicro.com
Priyanka Wani
AMEA
Amea_PR@trendmicro.com
Funda Cizgenakad
Europe
funda_cizgenakad@trendmicro.co.uk
Lorena Rodriguez
Latin America
lorena_rodriguez@trendmicro.com
Kaori Iizumi
Japan
pressweb@trendmicro.co.jp
Angela Chiang
Taiwan
angela_chiang@trend.com.tw

Discover Trend Micro

The history, people, and values behind the company.

  Media Coverage

Stay up-to-date
Get our news RSS.

Connect with us