• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Cloud Security

Security in the Cloud

  • Posted on:August 26, 2014
  • Posted in:Cloud Security, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

You’re off to the cloud, and the first thing you run into before you can reach altitude is a wall. That wall is your organization’s security requirements. Fortunately, it’s easy to break through that wall when you understand how security works in the cloud. The Model We’re lucky because the model for security in any…

Read More
Tags: AWSazure

Operational Efficiency: the Key to Data Center Success

  • Posted on:August 19, 2014
  • Posted in:Cloud Security, Security
  • Posted by:
    Mike Smith
0

              Virtualization is all about improving IT operational efficiency. It’s the prospect of doing more with less, of becoming more agile as an IT function and as an organization, which has turned this market into the multi-billion dollar one it is today. Gartner forecasted a couple of years back…

Read More

Extend Your Virtualized Data Center to the Cloud with Ease

  • Posted on:August 12, 2014
  • Posted in:Cloud, Cloud Security, Security
  • Posted by:
    Mike Smith
0

                Cloud-based applications have continued to grow exponentially. The majority of people are now interacting with cloud-based data and applications in one way or another, likely through social media such as Facebook, LinkedIn, etc. This comfort level is extending to business applications as well. IT and security professionals…

Read More

Optimize Your Modern Data Center with Next Generation Technologies

  • Posted on:August 5, 2014
  • Posted in:Cloud, Cloud Security, Security
  • Posted by:
    Mike Smith
0

                Remember the days when you had to provision servers manually? All that time and resource devoted to a hugely inefficient and error-strewn IT process. Then server virtualization came along, effectively abstracting the servers from the hardware, and we’ve never looked back. Now new virtualization technologies are appearing…

Read More

Your Journey to the Cloud: Securing the Modern Data Center

  • Posted on:July 30, 2014
  • Posted in:Cloud, Cloud Security, Private Cloud, Public Cloud, Security
  • Posted by:
    Mike Smith
0

              Speak to any IT manager today, and they’ll tell you they’re on a journey: a journey from a physical environment to virtualized and cloud environments. With no two IT environments the same, they’ll all be at a different stage of this journey, but the stats speak for themselves….

Read More

Automating Security on Azure

  • Posted on:July 11, 2014
  • Posted in:Cloud Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0
Cloud security agent/bodyguard

If you’re moving your computing needs to Azure, security is probably one of your top concerns. I’ve written about this before, so I’ll assume you’ve already read it. If not, it’s worth taking a few minutes to get a grounding. Operations Once you’ve got a solid understanding of the security model in place on Azure,…

Read More
Tags: azurecloudMicrosoft

All in on AWS: Dedalus Leading The Way in Brazil

  • Posted on:July 8, 2014
  • Posted in:Cloud, Cloud Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

I’m a nerd at heart, and – let’s face it – in action, but I do make an effort to review the materials that our non-technical teams publish. There’s a lot of great information there even if it isn’t in hex or binary. This week, I was reading through a case study for a partner…

Read More

The Code Spaces Nightmare

  • Posted on:June 20, 2014
  • Posted in:Cloud, Cloud Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
1

Updated, 20-Jun @ 6:22pm To say that this continues to be a really bad week for the Code Spaces team is a massive understatement. After gaining access to their administrative credentials, an attacker managed to quickly and easily wipe out their entire business. Both production and backup data was destroyed. Steve Ragan has a great…

Read More
Tags: AWS

The Internet is becoming more encrypted, but vulnerabilities remain

  • Posted on:May 22, 2014
  • Posted in:Cloud Computing, Cloud Security, Compliance & Regulations, Data Privacy, Encryption, Government Policy, Industry News, Internet Safety, Privacy, Privacy & Policy, Virtualization
  • Posted by:
    Trend Micro
0

Encryption has always been a central concern for the cybersecurity community, but it has taken on added importance following the 2013 revelations of widespread Internet surveillance by world governments and intelligence agencies.

Read More

Encryption needs to be a bigger part of cloud security

  • Posted on:May 10, 2014
  • Posted in:Cloud Computing, Cloud Security, Compliance & Regulations, Current News, Encryption, Industry News, Internet Safety, Private Cloud, Public Cloud, Virtualization, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

Many organizations are gradually setting aside their reservations about cloud security and storing more company data to the cloud, but security risks remain.

Read More
Page 14 of 14 « ‹ 1314

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Trend Micro Asks Students How Their Relationship to the Internet Has Changed During COVID-19
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.