• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for October 2009

Cloud Computing Standards, Dream vs. Reality

  • Posted on:October 28, 2009
  • Posted in:Cloud
  • Posted by:
    Justin Foster
1

Portability and interoperability in cloud computing may seem tangential to security, but avoiding vendor lock-in is about more than having access to competitive pricing or better service. When relying on a single provider there is inherent risk, especially in the availability of the service and data. Throughout history the need for portability and interoperability has…

Read More
Tags: APIsiaasOVFpaasportabilitysaasstandards

When Data Gets Breached in the Cloud, Who Owns the Mess?

  • Posted on:October 26, 2009
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
2

Trend Micro has been talking to many data center security folks and Infrastructure-as-a-Service (IaaS) providers to understand the dynamics of cloud security.  Something that strikes me is their frequent (mis)perception that the Infrastructure-as-a-Service provider will take care of security in the public cloud. IaaS providers are doing a decent job of baseline security (physical security,…

Read More
Tags: data breachDDoSiaas

The Sky is Falling on Cloud Computing

  • Posted on:October 20, 2009
  • Posted in:Cloud
  • Posted by:
    Trend Micro
0

Adding to what my colleague Todd has written on the Microsoft/Danger data loss issue… What has been billed as a large scale failure of cloud computing, more specifically, cloud storage, is making headlines and generating lots of heat but little light. Major outage hits T-Mobile Sidekick users:  “Users of T-Mobile’s Sidekick have been suffering through…

Read More
Tags: cloud computingdatacenteriaasMicrosoftsaasstorage

Danger and the Cloud

  • Posted on:October 19, 2009
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

T-Mobile USA’s Sidekick mobile phone service operated by Microsoft’s Danger subsidiary encountered a service disruption  that resulted in some Sidekick phone customers losing their personal information including contact names, phone numbers and digital photos  (the New York Times had a summary, and The Register has some juicy speculation on the origin of the outage).  Many…

Read More
Tags: cloud computingEC2iaasMicrosoftpaassaas

Myths and Misunderstandings of Cloud-based Security

  • Posted on:October 13, 2009
  • Posted in:Cloud
  • Posted by:
    Wei Yan
1

Andreas Marx and Maik Morgenstern presented their paper “Why in-the-cloud scanning is not a solution” at the recent Virus Bulletin 2009 conference.  The paper provided a list of the shortcomings of cloud-based security. Over the past year or so there have been several discussions on this topic, but Marx and Morgenstern have done a good…

Read More
Tags: cloud-based securityfalse positiveshash signaturesin-the-cloud scanningSmart Protection Network

DDoS and the Cloud: Sad but True

  • Posted on:October 9, 2009
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

Amazon EC2 customers recently suffered from a concerted Distributed Denial of Service (DDoS) attack that caused some consternation for the web-based code hosting service Bitbucket (news courtesy of my favorite IT tabloid, The Register).  An unfortunate fact of life about the massive DDoS such as Bitbucket appears to have suffered is that there is no…

Read More
Tags: cloud computingDDoShosted securityiaassaassecuritysocial networking

Is “trust us” good enough for private data in the public cloud?

  • Posted on:October 6, 2009
  • Posted in:Cloud
  • Posted by:
    Trend Micro
0

Every day brings more headlines about social networking, cloud computing and Software as a Service (SaaS).  Each of these fast growth areas shares an important element in common – they rely on a movement of data from private computers into the public cloud.  The theory goes that this data is protected by the service provider…

Read More
Tags: APIsCloud SecurityGoogle Appssaassecuritysocial networking

Security experts roundtable from InfoWeek 500 conference

  • Posted on:October 5, 2009
  • Posted in:Virtualization
  • Posted by:
    Dave Asprey
0

Trend Micro CEO Eva Chen took part in a Security Experts Roundtable at the InformationWeek 500 Conference in September. She was joined by Pacific Northwest Labs’ Jerry Johnson, RSA’s Mischel Kwon, and Time Warner’s Renee Guttman who shared their thoughts with Alex Wolfe about the changing nature of threats and the challenge of securing the…

Read More
Tags: cloud computingCSAvirtualization

U.S. Feds in the Clouds

  • Posted on:October 2, 2009
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

The US Federal Government recently announced its apps.gov portal for applications.  This CNet News article provides a summary of what was announced by Federal CIO Vivek Kundra.  apps.gov is a nice storefront featuring productivity applications to be used on non-sensitive data, and as such this announcement did not make big waves in the security community.  …

Read More
Tags: apps.govGoogle AppsPrivate CloudPublic Cloud

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.