For more than 30 years, Trend Micro has been protecting diverse devices, applications, and data. It continues to do so while also delivering high-value cybersecurity research.
Cybersecurity
Amid today’s uncertainty, top execs need to leverage frameworks, communication, and their leadership skills, say John Siefert, Bob Evans, Tony Uphoff, and Scott Vaughan in this Growth Swarm podcast.
These six cybersecurity practices can help board members create robust protocols to protect their organizations against diverse threats and attacks.
Transitioning to multi-cloud will be a challenge if no one on your security team has experience with the technology, says Rob Wood.
Cybersecurity giant Trend Micro broadens its portfolio by acquiring SOC leader Anlyz; Kieron Allen explains the impact for customers and partners.
The considerable benefits of multi-cloud architecture must be weighed against challenges like complexity and governance.
The right people, processes, and technology can help mitigate the security risks of a multi-cloud environment, says analyst Frank Domizio.
Multi-cloud provides flexibility, scalability, and cost efficiency, but securing this architecture requires a comprehensive approach. Frank Domizio explains.
Multi-cloud is a key driver of digital transformation for many organizations, but it’s not always easy to get your workforce on board. Here’s how.
Robert Wood takes a look at multi-cloud implementation and its implications for security.
Technology leaders may encounter resistance from their teams regarding multi-cloud transitions. Rob Wood advises how to handle it and move forward.
Lookout Strategy Chief Aaron Cockerill drills into the company’s State of Mobile Phishing Report and says education is a key tactic to reduce the threat.
A data governance framework is critical for an organization’s cybersecurity strategy. Frank Domizio explains why.
Annual mobile phishing report from security vendor Lookout has troubling findings about volume, complexity, and impact of phishing attacks. Kieron Allen reviews the findings, and how to respond.
The latest Growth Swarm podcast covers what practitioners must do to manage their businesses and technologies in today’s volatile economy.
The rise of software-as-a-service presents new business opportunities, but also new security challenges that need to be balanced with business enablement to ensure growth and protection. This guidebook on Securing Software-as-a-Service Applications, underwritten by Lookout, provides expert insights on how to integrate SaaS securely into businesses.
Security data often ends up distributed across many systems, which can be an issue when searching for threats. CISO Rob Wood advocates a more centralized approach.
Wayne Sadin shares why the advent of generative AI puts pressure on organizations to tighten up their data and security strategies to avoid bias and protect sensitive data.
Knowing the types of data that cybercriminals target for identity theft, financial fraud, or other malicious activities helps security teams implement effective protection.
GitGuardian addresses a critical and widespread problem: developers storing secrets, such as API keys, in repositories where they can be visible to nefarious actors.