• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for March 2011

CSA UK & Ireland announces cloud security manifesto

  • Posted on:March 30, 2011
  • Posted in:Spotlight
  • Posted by:
    Trend Micro
0

The Cloud Security Alliance, an organization devoted to promoting safe, robust and secure cloud computing solutions, recently expanded to the UK and Ireland. The CSA UK & Ireland recently held its first official meeting in London. In his speech to the inaugural meeting, CSA UK & Ireland president Des Ward told his audience the growth…

Read More
Tags: Cloud Security

Study: Security in the cloud a key concern for users

  • Posted on:March 30, 2011
  • Posted in:Cloud Computing, Current News
  • Posted by:
    Trend Micro
0

While cloud computing is becoming increasingly popular, many users remain unaware of the cloud’s advantages and features, according to a recent study conducted by research firm GfK. In addition, many users considering adoption of cloud-based solutions are concerned about cloud security, the research found. The study, which polled approximately 1,000 users, was presented at the…

Read More
Tags: cloud computingCloud SecurityInternet Security

How much will security bolster cloud computing?

  • Posted on:March 30, 2011
  • Posted in:Cloud Computing
  • Posted by:
    Trend Micro
0

A rapidly growing number of companies and organizations are adopting cloud computing as part of their IT solutions. Cloud computing offers a range of benefits to organizations of all sizes. By “renting” off-site resources, companies are able to scale their IT infrastructure up or down with minimal need for investment in additional hardware. Cloud-based software…

Read More
Tags: cloud computingcloud computing security

Nearly 40 percent of SMBs plan to move to cloud, Microsoft study finds

  • Posted on:March 30, 2011
  • Posted in:Cloud Computing, Current News
  • Posted by:
    Noah Gamer
0

Cloud adoption among small- and medium-sized businesses is expected to increase over the next three years, as SMBs turn to the technology to leverage potential cost savings and other benefits

Read More
Tags: cloud

Fearless Photos: Protecting your Pictures Online

  • Posted on:March 29, 2011
  • Posted in:Cloud
  • Posted by:
    Richard Medugno
0

If you’re like many, you have been storing your photos on your computers for a long time. And as time has gone by, both the volume and relative preciousness of your photos seem to increased dramatically. It’s probably become very difficult to keep track of and manage the whole kit and kaboodle. So you might…

Read More

Dedicated Servers vs. the New Amazon EC2 Dedicated Instance

  • Posted on:March 28, 2011
  • Posted in:Virtualization
  • Posted by:
    Dave Asprey
4

Dedicated Instances are Amazon EC2 instances launched within your Amazon Virtual Private Cloud (Amazon VPC) that run hardware dedicated to a single customer.

Of course, the humor here is that Amazon didn’t explain which hardware it was referring to. If you compare it to an enterprise server in a private data center, it’s clearly less secure (unless you applied cloud specific security and encryption tools perhaps). But if you compare it to existing hosting offering, it’s no less secure than enterprise grade hosting has been for a decade.

Read More
Tags: cloud computingCloud Securitycloud-based securitydatacenterEC2iaasPublic CloudSmart Protection Networkstoragevirtualization

Encryption in the Public Cloud: Advice for Security Techniques

  • Posted on:March 23, 2011
  • Posted in:Virtualization
  • Posted by:
    Dave Asprey
0

Surveys indicate that security is the number 1 challenge about the cloud.Ā  Using encrypted, self-defending hosts mitigates many security-in-the-cloud issues.Ā  Dave Asprey, VP-Cloud Security for Trend Micro,Ā presented to the SD Forum theseĀ 16 valuable points of advice regarding data privacy in the cloud.Ā  PLEASE CLICK ON THE “READ MORE” BUTTON TO ADVANCE DIRECTLY TO THE PRESENTATION….

Read More
Tags: cloud computingCloud Securitycloud-based securityEC2Encryptionhosted securityhypervisorsPublic CloudSecureCloudsecurity

Devops Does Not Make for Secure Ops

  • Posted on:March 22, 2011
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
7

In our hectic cloud-based world, devops (the mixing of infrastructure operations with software development) has become the standard way we build and run high-scale sites from IaaS to SaaS. There are lessons to be learned from how we got here, especially because devops isn’t very security friendly.

Read More
Tags: cloud computingCloud Securitycloud-based securityiaaspaasPrivacyPublic CloudsaasSecureCloudsecuritySecurity as a Servicevirtualization

How to Browse the Web Without Being Tracked

  • Posted on:March 21, 2011
  • Posted in:Security
  • Posted by:
    Richard Medugno
1

There are plenty of legitimate reasons why a responsible person might want to browse various websites without leaving a trail of evidence (cookies) in her wake, and none of them have to do with looking at anything racy. Private browsing allows a person to shop for a holiday or anniversary or birthday gift without resident…

Read More

What is Cloudbursting?

  • Posted on:March 15, 2011
  • Posted in:Cloud, Virtualization
  • Posted by:
    Trend Micro
9

Do you know what cloudbursting is? It is a concept where when you run out of your computing resources in your internal data center, you ā€œburstā€ the additional workload to an external cloud on an on-demand basis.

Read More
Tags: cloud computingCloud Securitycloud-based securitydatacenterEC2hypervisorsiaaspaasPrivate CloudPublic CloudsaasSecureCloudsocial networkingstandardsvirtualizationVMs
Page 1 of 212

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.