Here at Trend Micro, weāre always looking to stay one step ahead of the bad guys. This is no easy feat, especially when modern criminal organizations are well funded, incredibly agile and hold that vital trump card: the element of surprise. Weāve not done a bad job of it thus far, however and over the…
Read MoreLetās begin by understanding what you are doing in the cloud. Are you deploying applications with sensitive data?Ā Are you prototyping new web applications?Ā Are you transferring data to/from your internal environment?Ā Are you exposing applications to customers, partners or even employees around the globe? Are your applications up and running 24×7? These are examples…
Read More
With many aspects of IT moving from on-site systems to the cloud, companies have adjusted their cybersecurity strategies to better account for risks inherent in new platforms. However, ensuring that the cloud is secure is not a simple matter.
Read More
The National Institute of Standards and Technology recently rolled out Revision 4 of its SP 800-53 protocol that provides data compliance and security guidance to government agencies. The release marks the first update to the standard since 2005, and it includes new sections and appendices pertaining to cybersecurity and privacy.
Read More
The privacy of health records managed by the U.S. Veterans Administration recently became an issue of contention, in the wake of an investigative report from The Pittsburgh Tribune-Review that scrutinized the agency’s practices.
Read More