HomeLatest NewsCyber SecurityTrend Micro signs agreement with NISC to share threat information

Trend Micro signs agreement with NISC to share threat information

Preferred Source of Google

Cybersecurity firm Trend Micro has signed an agreement with the Japanese National Centre of Incident Readiness and Strategy for Cybersecurity (NISC) to provide threat information to the NISC until December 31, 2020.

Trend Micro said that it has partnered with a number of and local law enforcement agencies, such as the FBI, Interpol and law enforcement agencies in to mitigate the challenge of cybersecurity.

The company claimed that it continuously monitors the indication of terrorism to identify and counter new attacks similar to those that targeted the Iseshima Summit in 2016 and 2017 Asian Winter Games.

Advertisement
Saksham Bharat 2026
Saksham Bharat 2026
A multi-stakeholder dialogue on skilling gap in Cybersecurity, Data Resilience and AI — and the roadmap to a Saksham Bharat.
Register Now →
VeeamON 2026 Tour India - Mumbai
VeeamON 2026 Tour India - Mumbai
A VeeamON 2026 India Leadership Series Mumbai for senior public sector and government technology leaders.
Register Now →
Cyber Surakshit Uttar Pradesh
Cyber Surakshit Uttar Pradesh
Find out strategies, frameworks and solutions for building a resilient and secure digital ecosystem across Uttar Pradesh.
Register Now →
VeeamON 2026 Tour India - Bengaluru
VeeamON 2026 Tour India - Bengaluru
A VeeamON 2026 India Leadership Series Bengaluru for senior public sector and government technology leaders.
Register Now →
VeeamON 2026 Tour India - Delhi
VeeamON 2026 Tour India - Delhi
A VeeamON 2026 India Leadership Series Delhi for senior public sector and government technology leaders.
Register Now →
Infosec Reimagined
Infosec Reimagined
Infosec Reimagined 2026 is the premier information security summit where top leaders—CISOs, CROs, CIOs, CTOs and risk executives—converge to redefine cyber resilience.
Register Now →
Digital Senate
Digital Senate
Digital Senate is a premier conference uniting government leaders, technologists and innovators to share ideas, success stories and strategies on digital governance, public sector transformation, cybersecurity and emerging technologies in India.
Register Now →
CIO Prism
CIO Prism
CIO Prism unites forward-thinking technology leaders to exchange transformative insights, shape digital strategies, and foster innovation, empowering enterprises to excel in an era of rapid technological change.
Register Now →

“We have always considered the bad guys to be our main competitors – they are the ones we work to stop,” said Eva Chen, co-founder and chief executive officer for Trend Micro. “Collaborative agreements like this one with NISC are critical for our efforts to make the exchange of digital information safer. We are proud to provide our leading global threat intelligence to this strong organization so we can fight cybercrime together.”

The company stressed that cyberattacks originate from all over the world, which makes the use of truly global threat intelligence essential. Trend Micro claimed that few cybersecurity companies have the breadth of threat intelligence that it can offer the NISC, particularly as it relates to regional data across Asia from numerous countries and local languages.

Get the day's headlines from Tech Observer straight in your inbox

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
Tech Observer Desk
Tech Observer Desk
Tech Observer Desk at TechObserver.in is a team of technology reporters led by a senior editor who brings latest updates and developments from the world of technology.
- Advertisement -
Powered By Veeam Logo
- Advertisement -

Subscribe to our Newsletter

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
- Advertisement -

AI agents break legacy security models, Veeam CEO warns at VeeamON

Veeam Software CEO Anand Eswaran says zero-trust security models built for human users have broken down as autonomous AI agents move inside enterprises at machine speed, and that recovery, identity and data governance can no longer be treated as separate problems.

RELATED ARTICLES