Security versus flexibility: the two concepts have rarely been comfortable bedfellows. Allow too much flexibility, and security can become compromised, but focus too hard on security, and you may impact the effectiveness of the IT team. Todayâs IT managers know only too well that most of the products they use donât strike the right balance…
Read MoreWith any public cloud, security is a shared responsibility between the cloud service provider and you, the user of those services. For IaaS offerings, this usually means the division of responsibilities is as follows: Cloud Service Provider You Facilities Physical security Network infrastructure Virtualization layer Operating system Applications Data If youâve done work…
Read MoreMicrosoft recently held their annual Build conference. The premier developer event for Microsoft is usually quite predictable. You could safely expect a few incremental improvements in various technologies and fantastic developer sessions on current tech. See for yourself; the sessions are online from 2012 and 2013. Things were different this year. Iâll be addressing the…
Read MoreI recently hosted a webinar on optimizing security for AWS. The goal of the webinar was to help raise awareness of how security changes as you move to the AWS Cloud. I strongly believe that if youâre aware of the changes, you can actually build a stronger security posture for your deployments. The webinar runs…
Read MoreLast week, we said that the best things you can do to help protect yourself from the Heartbleed vulnerability were to make sure youâre running a security suite like Titanium, keep an eye on your accounts for unusual activity, and change your passwords when youâre told to by website operators. Today, we want to let…
Read MoreHere you will find the latest blogs from Trend Micro’s experts along with a comprehensive look at how the media has covered this vulnerability. We encourage you to scroll through the various blogs, provide comments and enjoy the in-depth knowledge that Trend Micro has to offer. April 17, 2014 Tools You Can Use to…
Read MoreOnly 4 months into 2014 and the Android malware problem continues to explode. Android malware and high risk apps have already reached the 2 million mark, putting us well on our way to our CTOâs prediction of 3 million pieces of malware and high risk apps (Diagram 1). In fact, in the first 3 months…
Read MoreTrend Micro has spent the past 25 years protecting its customers from the latest threats. Over that time, those threats, and the people behind them, have changed almost beyond recognition. Businesses have never before faced attacks on such a broad array of devices and applications as they do today, so weâve got to keep improving….
Read MoreNews of this weekâs massive and far reaching OpenSSL vulnerability âHeartbleedâ has put all of us on our heels. In what I would call the equivalent of an Internet oil spill, individuals and organizations are scrambling to discover how to clean up this mess and get on with business as usual. This will not be…
Read MoreHeartbleed just got real. The bug has been dominating headlines for the past week – and rightfully so. The scale of the impact of this issue is major. OpenSSL has been integrated into a significant number of development projects. Itâs probably the most commonly used security library out there. Late Friday night (the 11th of…
Read More