Even as the U.S. government plans to deploy more cloud computing solutions, a recent study by CTOlabs.com found the majority of federal agencies are still relying on legacy technology to store data. Earlier this year, federal CIO Vivek Kundra introduced a new IT strategy which mandates agencies consider a “cloud first” approach to technology deployments….Read More
Despite the increasing clarity of the threat to U.S. national security emanating from cyberspace, the country is woefully unprepared to meet it, according to testimony from government IT experts at a hearing held by Congress’ cyber security subcommittee. Gregory Wilshusen, director of information security issues for the Government Accountability Office, said a serious cyber attack…Read More
Applying the latest cloud provisioning and marketing analytics technologies, they’ve created an entirely new type of cloud service, Exploits as a Service, or EaaS.
Today’s threat landscape has required security vendors to change their approach to protecting customer data. TrendLabs℠, Trend Micro’s threat research arm, states there are now 3.5 new threats released every second by cybercriminals. Traditional approaches to security just cannot keep up with this. Enter cloud computing and the subsequent development of cloud-based protection networks. Customers who utilize a security vendor who has a robust cloud-based protection network will see significant advantages over those customers who still use more traditional methods. Not only can cloud-based protection networks use cloud computing methods to manage this security process more effectively, but also they are able to scale with the certain increase in threats in the future.
The sheer volume of personal banking data and the ease with which it can be accessed is staggering. Don’t for a moment think that cost or lack of skill is a barrier to entry into the shady world of “carding” and online financial fraud. Logon details for online banking are usually sold priced as a…Read More
Today’s disclosure by Google and Microsoft that they were tricked into serving malware highlights an inherent conflict of interest between advertising-based businesses and the security needs of their customers.
It’s exciting to see that the GSA is leading the way to modernize the federal government’s IT by moving to “the cloud.” However, in the rush to save money, the GSA may be repeating some mistakes that company IT departments have already made. Until cloud vendors step up to guarantee that their security is on par with enterprise security, they will be a poor choice for our government agencies. We don’t need another WikiLeaks.
In March the Cloud Security Alliance published “Top Threats to Cloud Computing V 1.0” to help organizations better understand the risks of cloud computing and to consequently make more informed risk management decisions when adopting cloud strategies. In that document the CSA outlined seven threats and suggested steps for remediation. At Trend we have traditionally…Read More
Now, even your security can be handled by cloud computing software–but consider these factors before you get on board. As a smart entrepreneur, the biggest problem to contend with regard to cybercriminals is that they’re smart entrepreneurs, too. They’re highly motivated and technically proficient workers. What they’re after isn’t fame or notoriety. It’s about money….Read More