It’s exciting to see that the GSA is leading the way to modernize the federal government’s IT by moving to “the cloud.” However, in the rush to save money, the GSA may be repeating some mistakes that company IT departments have already made. Until cloud vendors step up to guarantee that their security is on par with enterprise security, they will be a poor choice for our government agencies. We don’t need another WikiLeaks.Read More
- Dave Asprey, responsible for thought leadership and strategy as the Vice President of Cloud Security at Trend Micro. He works with press, analysts, customers, partners, the Cloud Security Alliance, and the cloud and virtualization community in general to bring more cloud knowledge into Trend Micro, and to share Trend Micro's innovative new cloud and virtualization strategy. The Financial Times calls him a ""bio-hacker who takes self-quantification to the extreme of self-experimentation"" because he upgraded his brain by 20 IQ points, lowered his biological age, and lost 100 lbs without using calories or exercise. Dave's writing has been published by the NY Times and Fortune and his cloudywords.com blog was named ""Top 100 cloud blogs"" by Cloud Expo. He spends most of his time speaking, writing, and thinking about cloud & virtualization security & performance.
Securing the journey to virtualization is complicated by two factors – (1) risks that are present in the physical datacenter, and (2) those that are unique to virtualized environments. As enterprises rush to embrace the benefits of virtualization, they have also rushed to implement traditionally architected security solutions in virtualized environments. Unfortunately, while this approach is familiar to enterprises, it results in undesirable consequences.Read More
Plenty of regulatory regimes mandate that enterprises have a segregation of duties or separation of duties as a required internal control mechanism. Separation of duties divides the responsibility of a critical task among different people and provides “checks and balances” against fraud or error.Read More
Enterprises using Adobe in an Infrastructure as a Service (IaaS) cloud environment may find a new Adobe Flash Player vulnerability to be of interest. Trend Micro’s antivirus and Trend Micro Deep Security offerings can both protect for this latest vulnerability and counter exploits of the vulnerability. If you have a IaaS cloud server with a…Read More
Adobe has issued a security advisory APSA 10-03 describing a new critical vulnerability in its products. This time, the primary target is Flash Player with multiple platforms—Windows, Mac, Linux, Solaris, and Android—all affected and is currently being exploited in the wild. Current versions of Acrobat and Reader—the target of last week’s vulnerability—are also affected by…Read More
SecureCloud enables enterprises to govern and control cloud data using encryption and sophisticated encryption key management. The encryption used in SecureCloud is standard AES 128 bit encryption, but the brilliance of the technology lies in key management functionality that validates the identity and integrity of the cloud server.
Pop the champagne corks! Trend Micro announced the public beta of Trend Micro SecureCloud – an exceptionally cool new offering that you can take for a test drive today. We can finally talk openly about a technology and business approach that addresses cloud security and data governance issues that have been confronting the industry (see…Read More
As I read different blogs, IT industry analysts and media, I see contradictions galore. Some articles position cloud computing as more secure (like this one) while other journalists highlight new security challenges (here, here, here and here). The concept of the cloud is still emerging and fallacies around cloud computing abound. Below are the five…Read More
Citrix Synergy in San Francisco was an exciting place to be this week – beautiful weather and lots of cool VDI (Virtual Desktop Infrastructure) technology. I was hoping to learn more about cloud & what’s going on when XenServer, but most of the focus was VDI. Lots of enterprises are dipping their toes into the…Read More