Most of us are aware of the need to protect our computers, but what about our cell phones? Can phones be infected with viruses or other malware? Unfortunately, the answer is yes. Smartphones (phones that have Internet capabilities and function more as mini-computers, such as the Droid or iPhone) can be at risk for viruses…Read More
Like many other sites that encourage users to share information, Foursquare and Facebook Places can be used relatively safely if you use them wisely. Foursquare and Facebook Places both allow users to enter their location via cell phone apps. This allows friends to see where other friends are at any given time. You can see…Read More
Today’s threat landscape has required security vendors to change their approach to protecting customer data. TrendLabs℠, Trend Micro’s threat research arm, states there are now 3.5 new threats released every second by cybercriminals. Traditional approaches to security just cannot keep up with this. Enter cloud computing and the subsequent development of cloud-based protection networks. Customers who utilize a security vendor who has a robust cloud-based protection network will see significant advantages over those customers who still use more traditional methods. Not only can cloud-based protection networks use cloud computing methods to manage this security process more effectively, but also they are able to scale with the certain increase in threats in the future.
I’m constantly annoyed by how broad the term “cloud” can be, and I try to use IaaS, PaaS, and SaaS instead, but even these categories are blurring at the edges. The bottom line is that if it’s hooked up to the internet, it can be controlled from a central location, and it scales up and down on demand, it’s in the cloud.