• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   AWS

Managing the Cloud in a 24/7 World

  • Posted on:December 12, 2016
  • Posted in:AWS, Business, Cloud, Cloud Security, Security
  • Posted by:
    Justin Foster
0

As moreĀ Enterprises embraceĀ the flexibility,Ā agility and cost savings of moving to cloud providers like Amazon Web Services (AWS), skills in cloud operations and security become increasingly critical. Many of the organizations that Trend Micro works with have turned to our leading cloud andĀ managed service partnerĀ family to offload day-to-day management of the entire solution stack,Ā avoiding the challenges…

Read More

Securing your cloud workloads just got easier: Deep Security as a Service is now on AWS Marketplace!

  • Posted on:November 28, 2016
  • Posted in:AWS, Business, Cloud Security, Security
  • Posted by:
    Justin Foster
0
Cloud security is critical, because hackers have set their sights on the virtual realm.

Here at Trend Micro we are constantly trying to make securing cloud workloads easier. Four years ago, we launched Deep Security as a Service to simplify how cloud workloads are secured, and the growth of the service has been phenomenal. Thousands of AWS users depend on Deep Security as a Service to protect their elastic…

Read More

Federal Agencies’ Compliance & Security Streamlined with AWS Quick Start and Deep Security

  • Posted on:June 20, 2016
  • Posted in:AWS, Cloud Computing, Cloud Security, Security
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

We’ve heard for some time how each year is going to be the ā€œYear of Cloud Computing,ā€ but only in 2015 did we really see the momentum start to build in the public sector since the Cloud First Strategy was announced in 2011. We expect cloud adoption to grow exponentially over the next five years…

Read More

Five Questions with Healthdirect Australia

  • Posted on:June 8, 2016
  • Posted in:AWS, Cloud Security, Healthcare
  • Posted by:
    Muriel Mathis
0

Established in 2006 by the Council of Australian Governments, Healthdirect Australia offers free health advice online and by phone. Its popular services attract one million phone calls each year and a million visits to its web properties every month. The firm was one of Amazon Web Services’ first customers when the cloud giant opened its…

Read More

Automate Vulnerability Scanning With Amazon Inspector and Deep Security

  • Posted on:April 19, 2016
  • Posted in:AWS
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0
Workflow in a factory centered around a conveyor belt

Editors Node: Over time the Deep Security API has evolved making this workflow trivial using the APIs. Therefore the integration code has been retired and instructions on how to replicate the workflow are available in the Deep Security Automation Center. Vulnerability scanning in the cloud has always been challenging. Trying to arrange scans with your…

Read More
Tags: devopsproductvulnerability management

Don’t let procurement get in the way of your cloud journey

  • Posted on:March 23, 2016
  • Posted in:AWS, Cloud, Cloud Security
  • Posted by:
    Justin Foster
0

We have to get this app launched… tomorrow!” Does this sound familiar? For the latest project, your company has decided to go to Amazon Web Services. Everyone loves that with AWS you don’t have to guess at capacity before you launch, pay up front for infrastructure or worry about how you’ll expand globally if the…

Read More

Cloud Security: Segmentation, Isolation and Accreditation… oh my!

  • Posted on:November 11, 2015
  • Posted in:AWS, Cloud, Cloud Security
  • Posted by:
    Justin Foster
0

There was a time, not too long ago, where simple perimeter firewalls were the state of the art. It was too complex and costly to implement proper segmentation for servers. All that’s changed with the advent of software-defined networking and advances in virtualization and host-based software. Toto, I’ve got a feeling we’re not in Kansas…

Read More

Cloud Security: To patch or not to patch…

  • Posted on:November 4, 2015
  • Posted in:AWS, Cloud, Cloud Security
  • Posted by:
    Justin Foster
0

Time to continue with our important Amazon Web Services best practices from the Gartner paper on Cloud Workload Security. Actually, time is at the heart of this top tip. Picture yourself April 1, 2014. The Heartbleed vulnerability is disclosed. It allows attackers to pull potentially sensitive information from memory using a flaw in the SSL…

Read More

Cloud Security: Secure from Development to Deployment

  • Posted on:October 28, 2015
  • Posted in:AWS, Cloud, Cloud Security
  • Posted by:
    Justin Foster
0

In our previous tips in this series on Amazon Web Services best practices from a recent Gartner paper on Cloud Workload Security, we covered how security responsibility is shared between Amazon Web Services and you, the user. Next we covered how important visibility is to ensuring your part of the shared responsibility model. Another important…

Read More

Amazon Inspector and Deep Security

  • Posted on:October 7, 2015
  • Posted in:AWS, Cloud Computing
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0
Amazon Inspector landing page

Editors Node: Over time the Deep Security API has evolved making this workflow trivial using the APIs. Therefore the integration code has been retired and instructions on how to replicate the workflow are available in the Deep Security Automation Center. AWS announced several news services during the day one keynote at AWS re:Invent. One of…

Read More
Tags: AWSDeep Security
Page 3 of 4 « ‹ 234 ›

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Digital Transformation is Growing but May Be Insecure for Many
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.