• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research

Cloud Computing Standards, Dream vs. Reality

  • Posted on:October 28, 2009
  • Posted in:Cloud
  • Posted by:
    Justin Foster
1

Portability and interoperability in cloud computing may seem tangential to security, but avoiding vendor lock-in is about more than having access to competitive pricing or better service. When relying on a single provider there is inherent risk, especially in the availability of the service and data. Throughout history the need for portability and interoperability has…

Read More
Tags: APIsiaasOVFpaasportabilitysaasstandards

When Data Gets Breached in the Cloud, Who Owns the Mess?

  • Posted on:October 26, 2009
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
2

Trend Micro has been talking to many data center security folks and Infrastructure-as-a-Service (IaaS) providers to understand the dynamics of cloud security.  Something that strikes me is their frequent (mis)perception that the Infrastructure-as-a-Service provider will take care of security in the public cloud. IaaS providers are doing a decent job of baseline security (physical security,…

Read More
Tags: data breachDDoSiaas

The Sky is Falling on Cloud Computing

  • Posted on:October 20, 2009
  • Posted in:Cloud
  • Posted by:
    Trend Micro
0

Adding to what my colleague Todd has written on the Microsoft/Danger data loss issue… What has been billed as a large scale failure of cloud computing, more specifically, cloud storage, is making headlines and generating lots of heat but little light. Major outage hits T-Mobile Sidekick users:  “Users of T-Mobile’s Sidekick have been suffering through…

Read More
Tags: cloud computingdatacenteriaasMicrosoftsaasstorage

Danger and the Cloud

  • Posted on:October 19, 2009
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

T-Mobile USA’s Sidekick mobile phone service operated by Microsoft’s Danger subsidiary encountered a service disruption  that resulted in some Sidekick phone customers losing their personal information including contact names, phone numbers and digital photos  (the New York Times had a summary, and The Register has some juicy speculation on the origin of the outage).  Many…

Read More
Tags: cloud computingEC2iaasMicrosoftpaassaas

Myths and Misunderstandings of Cloud-based Security

  • Posted on:October 13, 2009
  • Posted in:Cloud
  • Posted by:
    Wei Yan
1

Andreas Marx and Maik Morgenstern presented their paper “Why in-the-cloud scanning is not a solution” at the recent Virus Bulletin 2009 conference.  The paper provided a list of the shortcomings of cloud-based security. Over the past year or so there have been several discussions on this topic, but Marx and Morgenstern have done a good…

Read More
Tags: cloud-based securityfalse positiveshash signaturesin-the-cloud scanningSmart Protection Network

DDoS and the Cloud: Sad but True

  • Posted on:October 9, 2009
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

Amazon EC2 customers recently suffered from a concerted Distributed Denial of Service (DDoS) attack that caused some consternation for the web-based code hosting service Bitbucket (news courtesy of my favorite IT tabloid, The Register).  An unfortunate fact of life about the massive DDoS such as Bitbucket appears to have suffered is that there is no…

Read More
Tags: cloud computingDDoShosted securityiaassaassecuritysocial networking

Is “trust us” good enough for private data in the public cloud?

  • Posted on:October 6, 2009
  • Posted in:Cloud
  • Posted by:
    Trend Micro
0

Every day brings more headlines about social networking, cloud computing and Software as a Service (SaaS).  Each of these fast growth areas shares an important element in common – they rely on a movement of data from private computers into the public cloud.  The theory goes that this data is protected by the service provider…

Read More
Tags: APIsCloud SecurityGoogle Appssaassecuritysocial networking

U.S. Feds in the Clouds

  • Posted on:October 2, 2009
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

The US Federal Government recently announced its apps.gov portal for applications.  This CNet News article provides a summary of what was announced by Federal CIO Vivek Kundra.  apps.gov is a nice storefront featuring productivity applications to be used on non-sensitive data, and as such this announcement did not make big waves in the security community.  …

Read More
Tags: apps.govGoogle AppsPrivate CloudPublic Cloud

The Security as a Service Model

  • Posted on:September 29, 2009
  • Posted in:Cloud
  • Posted by:
    John Maddison
0

It’s been almost four years ago since I started to look at the SaaS security model for Trend Micro. To be honest, being a software company, it was very hard getting anybody’s attention. However, the team persisted and sometimes learnt the hard way around what it takes to deliver high availability SaaS applications. Software as…

Read More
Tags: saasSecurity as a Service

Cloud Security Summit Featuring Raimund Genes

  • Posted on:September 16, 2009
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

BrightTalk is hosting a Cloud Security Summit on September 30.  At this summit, industry leaders will dive into the different security options available across multiple cloud architectures, and case studies and association presentations will further illustrate the security issues facing the cloud today.  Trend Micro’s CTO, Raimund Genes, will present “The Threat Cloud Landscape” discussing…

Read More
Page 239 of 240 « ‹ 238239240 ›

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Trend Micro Asks Students How Their Relationship to the Internet Has Changed During COVID-19
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.