Take a Product Tour Request a Demo Cybersecurity Assessment Contact Us

Blogs

The latest cybersecurity trends, best practices, security vulnerabilities, and more

RECENT STORIES

Women of Trellix Discuss Visibility, Access and Opportunity

Women of Trellix Discuss Visibility, Access and Opportunity

At Trellix, we're committed to fostering an environment where women not only have a seat at the table but are empowered to lead.

Read the Article

Analysis of Black Basta Ransomware Chat Leaks

Analysis of Black Basta Ransomware Chat Leaks

Trellix obtained access to Black Basta's chat leaks at the end of February 2025 and immediately began analyzing the chat logs. Given that Black Basta is a rebrand of Conti RaaS, our approach mirrored that which we took in Conti Leaks: Examining the Panama Papers of Ransomware.

Read the Article

Trellix NDR: Unleashing the Power of Trellix Wise AI for Unmatched Network Security

Trellix NDR: Unleashing the Power of Trellix Wise AI for Unmatched Network Security

Trellix NDR with Wise AI provides greater threat detection accuracy, reduces false positives, automates complex tasks, and empowers your security team to focus on what matters most: strategic defense.

Read the Article

Protecting Data in the Age of AI: A Guide to Getting Started

Protecting Data in the Age of AI: A Guide to Getting Started

The emergence of AI tools has left organizations racing to protect sensitive data. Are you ready? Our experts suggest starting with an acceptable use policy.

Read the Article

Finding Patient Zero with Endpoint Forensics

Finding Patient Zero with Endpoint Forensics

EDR with Forensics helps identify initial cyberattack compromises, like phishing, by collecting real-time events and forensic data for faster investigation.

Read the Article

Get the latest

Stay up to date with the latest cybersecurity trends, best practices, security vulnerabilities, and so much more.
Please enter a valid email address.

Zero spam. Unsubscribe at any time.