• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Cloud

The Life Cycle of a Compromised (Cloud) Server

  • Posted on:September 1, 2020
  • Posted in:Cloud, Cloud Security, Cybercrime, Network, Ransomware, Security, Targeted Attacks
  • Posted by:
    Bob McArdle
0

Trend Micro Research has developed a go-to resource for all things related to cybercriminal underground hosting and infrastructure. Today we released the second in this three-part series of reports which detail the what, how, and why of cybercriminal hosting (see the first part here). As part of this report, we dive into the common life…

Read More
Tags: Cloud SecurityCompromised ServercryptominingCyprocurrency MiningLifecycleTargeted ransomware

Removing Open Source Visibility Challenges for Security Operations Teams

  • Posted on:August 25, 2020
  • Posted in:Cloud, Cloud Security, Partners
  • Posted by:
    Trend Micro
0

  Identifying security threats early can be difficult, especially when you’re running multiple security tools across disparate business units and cloud projects. When it comes to protecting cloud-native applications, separating legitimate risks from noise and distractions is often a real challenge.   That’s why forward-thinking organizations look at things a little differently. They want to…

Read More
Tags: cloudopen sourcevulnerability

ESG Findings on Trend Micro Cloud-Powered XDR Drives Monumental Business Value

  • Posted on:July 30, 2020
  • Posted in:Cloud, XDR
  • Posted by:
    Trend Micro
0

This material was published by ESG Research Insights Report, Validating Trend Micro’s Approach and Enhancing GTM Intelligence, 2020.      

Read More
Tags: XDR

Have You Considered Your Organization’s Technical Debt?

  • Posted on:July 21, 2020
  • Posted in:Cloud, Cloud Security
  • Posted by:
    Madeline Van Der Paelt
0

TL;DR Deal with your dirty laundry. Have you ever skipped doing your laundry and watched as that pile of dirty clothes kept growing, just waiting for you to get around to it? You’re busy, you’re tired and you keep saying you’ll get to it tomorrow. Then suddenly, you realize that it’s been three weeks and now…

Read More
Tags: cloud computingdevops

Fixing cloud migration: What goes wrong and why?

  • Posted on:July 16, 2020
  • Posted in:Cloud, Cloud Computing, Cloud Security
  • Posted by:
    Trend Micro
0

  The cloud space has been evolving for almost a decade. As a company we’re a major cloud user ourselves. That means we’ve built up a huge amount of in-house expertise over the years around cloud migration — including common challenges and perspectives on how organizations can best approach projects to improve success rates. As…

Read More
Tags: cloud migrationCloud Security

Beyond the Endpoint: Why Organizations are Choosing XDR for Holistic Detection and Response

  • Posted on:July 6, 2020
  • Posted in:Cloud, Endpoint, XDR
  • Posted by:
    Trend Micro
0

The endpoint has long been a major focal point for attackers targeting enterprise IT environments. Yet increasingly, security bosses are being forced to protect data across the organization, whether it’s in the cloud, on IoT devices, in email, or on-premises servers. Attackers may jump from one environment to the next in multi-stage attacks and even…

Read More
Tags: Cloud Securityend pointendpoint detection and responseXDR

Are You Promoting Security Fluency in your Organization?

  • Posted on:June 30, 2020
  • Posted in:Cloud, Cloud Computing, Cloud Security, misconfiguration
  • Posted by:
    Trend Micro
0

  Migrating to the cloud is hard. The PowerPoint deck and pretty architectures are drawn up quickly but the work required to make the move will take months and possibly years.   The early stages require significant effort by teams to learn new technologies (the cloud services themselves) and new ways of the working (the…

Read More
Tags: Cloud Securitymisconfiguration

Perspectives Summary – What You Said

  • Posted on:June 26, 2020
  • Posted in:Cloud, Cloud Security, Current News, Executive Insight
  • Posted by:
    William "Bill" Malik (CISA VP Infrastructure Strategies)
0

  On Thursday, June 25, Trend Micro hosted our Perspectives 2-hour virtual event. As the session progressed, we asked our attendees, composed of +5000 global registrants, two key questions. This blog analyzes those answers.   First, what is your current strategy for securing the cloud? Rely completely on native cloud platform security capabilities (AWS, Azure,…

Read More
Tags: Cloud Security

Principles of a Cloud Migration

  • Posted on:June 26, 2020
  • Posted in:Cloud, Cloud Computing, Cloud Security, DevOps
  • Posted by:
    Jason Dablow
0
cloud

Development and application teams can be the initial entry point of a cloud migration as they start looking at faster ways to accelerate value delivery. One of the main things they might use during this is “Infrastructure as Code,” where they are creating cloud resources for running their applications using lines of code. In the…

Read More
Tags: cloud migration

8 Cloud Myths Debunked

  • Posted on:June 25, 2020
  • Posted in:Cloud, Cloud Computing, Cloud Security, DevOps
  • Posted by:
    Trend Micro
0

Many businesses have misperceptions about cloud environments, providers, and how to secure it all. We want to help you separate fact from fiction when it comes to your cloud environment. This list debunks 8 myths to help you confidently take the next steps in the cloud.

Read More
Tags: cloud myths
Page 1 of 3312 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Trend Micro Asks Students How Their Relationship to the Internet Has Changed During COVID-19
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.