Movatterモバイル変換


[0]ホーム

URL:


arrow_back
search
close

"What Is?" Cybersecurity Library

Quick answers to your cybersecurity questions and links to more in-depth information

The “What Is?” Cybersecurity Library provides quick answers to security-related questions as well as more in-depth information, Trend Micro Research, and industry articles.

Table of Contents

keyboard_arrow_down

Learn about how the Log4j vulnerability started, how it's evolving and what you can do to be secure against the vulnerability

        A cyberattack is a deliberate and malicious attempt by an individual or group to penetrate the information systems of organisations or individuals in order to steal data, disrupt business operations or supply chains or modify data and use it for blackmail, for example.

            Cybersecurity platforms integrate security visibility, analysis, and controls across multiple security layers and data sources while enhancing protection, scalability, and performance.

                    Cloud native is a design philosophy that refers to applications that utilize cloud infrastructure for portable, scalable software. A cloud-native app is built with loosely coupled microservices and runs on abstract software units, such as containers.

                      Securing containers is a continuous process integrated into your development, operations, and maintenance processes and infrastructures.

                            Cyber insurance is a type of insurance policy that provides coverage for businesses to shield them from losses as a result of data breaches, cyber attcks, and other liabilities.

                                      Discover what the Deep Web is, how it differs from the Dark Web, and why it's essential for privacy and security online. Learn how to access it safely.

                                            From Fortune 500 firms to global enterprises, no organization is too large to fall victim to a data breach. The cost? Financial loss, reputational damage, and regulatory fallout.

                                                        Learn about Data Security using behavioral analytics and predictive threat detection to guard sensitive information, prevent leaks, insider threats, and cyberattacks in both cloud and on-premises environments.

                                                                    Data sovereignty refers to the principle that digital information is governed by the laws of the country in which it is collected or stored.

                                                                                Learn about endpoint security and how it protects devices from cyber threats. Discover our Endpoint Security Solution for businesses and its unique features.

                                                                                              In cybersecurity, Governance, Risk, and Compliance (GRC) is about aligning security practices with business objectives, ensuring compliance with regulatory standards, and managing risks effectively.

                                                                                                            Discover what Identity and Access Management (IAM) is, it's meaning, how it works, and its key benefits. Explore best practices, common challenges, and emerging trends shaping the future of IAM security.

                                                                                                                  Learn more about penetration testing and how ethical hackers create attacks to discover new security vulnerabilities through pen tests.

                                                                                                                                    The art of stealing user or corporate information through well-crafted emails that rely on social engineering techniques. The more masterful the attack, the less the user will realize they have been duped.

                                                                                                                                                      Learn why proactive security is important to cybersecurity and how to implement proactive security approaches.

                                                                                                                                                                          Learn all about this prevalent and pervasive form of malware. Hackers hold the key to decrypting files for a fee, holding the user’s data and system control for ransom.

                                                                                                                                                                                              Learn about Security Operations (SecOps), what it involves, and why it’s important for mitigating, responding, and safeguarding the entire IT infrastructure.

                                                                                                                                                                                                                    Learn the social engineering definition, how it works, and how to defend against deception-based cyber attacks and fraud.

                                                                                                                                                                                                                                          Learn the VPN meaning, how VPN internet connections enhance security, and why businesses rely on them for privacy, remote access, and data protection.

                                                                                                                                                                                                                                                                  An architectural approach and goal for network security that assumes that every transaction, entity, and identity is untrusted until trust is established and maintained over time.

                                                                                                                                                                                                                                                                                          Zerologon uses a cryptography weakness to pretend it's something or someone it's not. Get the details of the history and how to prevent yourself from being its next victim.

                                                                                                                                                                                                                                                                                                                    Other resources

                                                                                                                                                                                                                                                                                                                    Glossary of Terms

                                                                                                                                                                                                                                                                                                                    Threat Encyclopedia

                                                                                                                                                                                                                                                                                                                    Security News

                                                                                                                                                                                                                                                                                                                    Security Reports

                                                                                                                                                                                                                                                                                                                    Research, News, and Perspectives

                                                                                                                                                                                                                                                                                                                    Research and Analysis

                                                                                                                                                                                                                                                                                                                    Enterprise Guides

                                                                                                                                                                                                                                                                                                                    Trend Vision One™ - Proactive Security Starts Here.

                                                                                                                                                                                                                                                                                                                    Country Headquarters

                                                                                                                                                                                                                                                                                                                    • Trend Micro - United States (US)
                                                                                                                                                                                                                                                                                                                    • 225 East John Carpenter Freeway
                                                                                                                                                                                                                                                                                                                      Suite 1500
                                                                                                                                                                                                                                                                                                                      Irving, Texas 75062
                                                                                                                                                                                                                                                                                                                    • Phone: +1 (817) 569-8900
                                                                                                                                                                                                                                                                                                                    Copyright ©2026 Trend Micro Incorporated. All rights reserved.
                                                                                                                                                                                                                                                                                                                    sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk

                                                                                                                                                                                                                                                                                                                    [8]ページ先頭

                                                                                                                                                                                                                                                                                                                    ©2009-2026 Movatter.jp