Frank Gens of IDC says 2010 will be a transformational year for IT, driven in part by cloud computing. Although cloud computing is a hot topic, a lot of IT folks remain confused and unsure about a host of issues from vendor selection and control to security and compliance. We’ve tried to help by compiling…
Read MoreI attended the Gartner Data Center Conference in Las Vegas in December to gain some insights about how enterprise IT professionals are viewing virtualization and cloud computing. While I dislike Las Vegas in general, I was able to visit the Pinball Hall of Fame (a must-see if you’re a pinball aficionado). From a security perspective,…
Read MoreAt Trend Micro we are leading the way in security FROM the cloud with our Smart Protection Network by providing threat correlation in the cloud. That strategy, rubbished by some at the time, has since been proved out by the number of competitors now trying to imitate it and the recent real world test results…
Read MoreAre you still a skeptic about cloud computing? Do you remember when you refused to bank online because it couldn’t be safe? I do. In fact, I even remember working with one of the leading banks in Canada when the CIO declared that no employees should have access to the Internet—for any business reason, ever….
Read MoreTrend Micro CEO Eva Chen took part in a Security Experts Roundtable at the InformationWeek 500 Conference in September. She was joined by Pacific Northwest Labs’ Jerry Johnson, RSA’s Mischel Kwon, and Time Warner’s Renee Guttman who shared their thoughts with Alex Wolfe about the changing nature of threats and the challenge of securing the…
Read MoreCloud-based security as a service offerings have seen a steady increase in popularity, due to the benefits that the deployment model provides. Security as a service enables rapid provisioning, cost savings and enhanced security through real-time updates and the community effect. With the explosive adoption of public cloud computing it’s time we apply the techniques…
Read MoreHypervisors bring new capabilities to us, but they also bring new computing risks. Understanding this new environment is important. As virtualization becomes mainstream, we need to find ways to identify risks and protect these new infrastructures. Hypervisors, while central to all virtualization methods, are a core risk area. Hypervisors are a “meta” operating system in…
Read MoreWhen your servers are in the cloud, then your own perimeter provides no protection, the security is often “lowest common denominator security” which undermines both confidence and compliance. Co-location of virtual instances and data with that of strangers, competitors and possibly even malicious actors (we have already seen criminal activity being hosted in Amazon’s EC2…
Read More