• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for April 2013

Why It’s Time to Manage Your Networking and Security from the Cloud

  • Posted on:April 30, 2013
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

If you still believe that your systems management consoles should be running on servers in your data center, you’re definitely from the pre-cloud era. Even if you believe your systems management and security consoles should be running on infrastructure as a service instances you control, you’re also out of date. The evidence is in, and…

Read More
Tags: AWSCiscocloudcloud managementCloud SecurityDeep Security as a ServiceIT managementMerakisaassystems management

5 Questions to Ask Your Security Vendor about AWS

  • Posted on:April 30, 2013
  • Posted in:Cloud
  • Posted by:
    Trend Micro
0

Over the past weeks we have been reviewing the top 10 tips for securing instances running on Amazon Web Services. We walked through the critical controls as part of the AWS shared security model. As noted in these tips, host-based security capabilities such as intrusion detection and prevention, anti-malware, and integrity monitoring are critical for…

Read More
Tags: AmazonAmazon EC2amazon machine imageamazon web servicesAWSChefCloud SecurityCloudFormationDeep SecurityDeep Security as a Servicehow to secure AWSiaasproductPuppetRightScalesecuring AWStrend micro

Making security strategies more sophisticated with big data

  • Posted on:April 29, 2013
  • Posted in:Cybercrime, Privacy & Policy
  • Posted by:
    Trend Micro
0

Cybercriminals are getting more advanced and learning how to attack companies in new and innovative ways every day. Mark Seward, senior director of security and compliance at Splunk, wrote on The Guardian that with these attacks comes a responsibility from companies to protect against breaches in the best way possible.

Read More
Tags: cybercrimeData PrivacyPrivacy & Policy

AWS OpsWorks: Targeting PaaS with Chef?

  • Posted on:April 29, 2013
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

Amazon Web Services did it again. Its new service, OpsWorks, is an application management service with the ability to manage applications of any scale or complexity in the AWS cloud. This integrated system manages resource provisioning, configuration management, application deployment, software updates, and monitoring and access control. The service is another offering from the leader in…

Read More
Tags: amazon web servicesapplication managementAWSChefcloud developmentCloud Securityhow to secure AWSOpsCode Chef frameworkOpsWorksOpsWorks APIpaasPeritorplatform as a service

AP Twitter hack causes market chaos, public panic

  • Posted on:April 27, 2013
  • Posted in:Current News, Cybercrime
  • Posted by:
    Trend Micro
0

It’s often wondered just how much digital interactions on Twitter truly impact the physical world. An instance this week showed a small taste of just how powerful the website can be in the wrong hands, as The Associated Press’ Twitter feed was hacked to display the message “Breaking: Two Explosions in the White House and Barack Obama is injured” to the organization’s nearly 2 million followers.

Read More
Tags: Current Newscybercrime

Credit unions pushing for legislative assistance in data security struggle

  • Posted on:April 26, 2013
  • Posted in:Current News, Cybercrime
  • Posted by:
    Trend Micro
0

Looking for better data security support, The Credit Union Times said financial service trade associations are supporting bills passed by the House this week that would enforce federal agency security and increase research and development.

Read More
Tags: Current Newscybercrime

Apply lessons learned from Wi-Fi to help BYOD

  • Posted on:April 26, 2013
  • Posted in:Cloud Computing, Compliance & Regulations, Mobility
  • Posted by:
    Trend Micro
0

It wasn’t long ago that companies had to figure out the Wi-Fi system for their company and how they wanted to make sure everything was secure across the network. Now, businesses are dealing with mobile devices as a transformative technology and must work to figure out a BYOD (Bring your own Device) plan before it is too late

Read More
Tags: Cloud SecurityCompliance & RegulationsMobility

What the Hack is Going on with Twitter!?

  • Posted on:April 25, 2013
  • Posted in:Security
  • Posted by:
    Richard Medugno
4

By Jamie Haggett I’m sure you’ve watched the news in the last few months and have seen a ton of high profile hacks on Twitter, including big brands such as Jeep, Burger King, and most recently the Associated Press (AP). I think the average person outside of the computer world is left wondering a few…

Read More

Little tweaks can boost performance and keep data safe! (Infographic)

  • Posted on:April 25, 2013
  • Posted in:Security
  • Posted by:
    Richard Medugno
0

(Click on twice to enlarge.)

Read More

Simplify cloud compliance with a data security focus

  • Posted on:April 23, 2013
  • Posted in:Cloud Computing, Compliance & Regulations
  • Posted by:
    Trend Micro
0

Dealing with cloud computing security risks and regulations has never been easy. Davey Winder on CloudPro likened the development of cloud standards and best practices to herding cats, bordering on very difficult to impossible, as the technology does not recognize international or industrial boundaries.

Read More
Tags: cloud computingCompliance & Regulations
Page 1 of 412 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Offerings Are FedRAMP Authorized and Available on AWS
  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRN® Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.