I’ve written about how monitoring and incident response change in hybrid and full cloud environments as part of this series on operations. This post is going to touch on the changes facing forensics in cloud environments. Define:Forensics Before we dive in, I wanted to highlight that there are two definitions of “forensics” in use today….Read More
A recently unveiled piece of malware shows that users don’t have to download a file or visit a questionable website to have their systems compromised.
Malware is becoming increasingly economical to develop and deploy, and nowhere is this clearer than in China, where gangs have been quick to adapt their strategies in response to changes in mobile technology and user behavior.
Lately, I’ve been looking at our approach to updating security operations to deal with the realities of hybrid and full cloud environments. If you’ve missed the series so far, I’d recommend reading the first and second posts now. This post is going to highlight a few of the challenges that your network security monitoring practice…Read More
As network resources become more readily available, it’s perhaps unsurprising that distributed denial of service attacks have become stronger and more frequent.
It would be shame if I didn’t celebrate today’s theme with my latest blog on the Dark or Deep Web. Here at Trend Micro we like to emphasize a “Deep” naming convention on many of our industry leading products so for our purposes, I will brand it the “Deep Web” going forward. There are several correlations on the…Read More
Bitcoin has been a magnet for commentary about the future of payments security and privacy. At the same time, it’s attracted a lot of attention from criminals, with several exchanges shutting down after possible thefts.
In my last post, I highlighted the lack of sharing in the information security community around best practices and discussed the ups and downs of operating security in hybrid and full cloud environments. I wrapped that post up with a call to arms of sorts but also a promise to help kick things off. Incident…Read More
With all the media and security research attention in 2013 being focused on the targeted attack phenomenon and the growth in the numbers and type of organisations falling victim to these attacks, you could be thinking that traditional end-user level attack campaigns are on the wane. You’d be wrong, very wrong. Cybercriminals are still following…Read More