• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Elisa Lippincott
    • Mark Nunnikhoven
    • Jon Clay
  • Research
Home   »   azure

Build With Confidence

  • Posted on:November 13, 2014
  • Posted in:Cloud Security, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

Build with confidence from marknca on Vimeo. As an app developer, you know that security is important, but sometimes you can lose perspective as to why it’s important. Your users trust that when they share their data with your app, it will be safe. That trust is critical to your success and to your users’…

Read More
Tags: AWSazurecloud developmentdevops

Security in the Cloud

  • Posted on:August 26, 2014
  • Posted in:Cloud Security, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

You’re off to the cloud, and the first thing you run into before you can reach altitude is a wall. That wall is your organization’s security requirements. Fortunately, it’s easy to break through that wall when you understand how security works in the cloud. The Model We’re lucky because the model for security in any…

Read More
Tags: AWSazure

Automating Security on Azure

  • Posted on:July 11, 2014
  • Posted in:Cloud Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0
Cloud security agent/bodyguard

If you’re moving your computing needs to Azure, security is probably one of your top concerns. I’ve written about this before, so I’ll assume you’ve already read it. If not, it’s worth taking a few minutes to get a grounding. Operations Once you’ve got a solid understanding of the security model in place on Azure,…

Read More
Tags: azurecloudMicrosoft

Microsoft Azure VM Agent Extension For Deep Security

  • Posted on:May 18, 2014
  • Posted in:Cloud, Partners
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

Working in Microsoft Azure is exciting. Nowhere was this more evident than at TechEd 2014 – a whirlwind of new features, techniques and designs. Vibhor Kappor has a great summary up on the Azure blog that will help get you up to speed. While you’re reading the announcements, it’s important to keep in mind how security on…

Read More
Tags: azureCloud SecurityDeep SecurityDeep Security as a Service

Security On Azure

  • Posted on:April 24, 2014
  • Posted in:Cloud, Partners, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

With any public cloud, security is a shared responsibility between the cloud service provider and you, the user of those services. For IaaS offerings, this usually means the division of responsibilities is as follows:   Cloud Service Provider You Facilities Physical security Network infrastructure Virtualization layer Operating system Applications Data   If you’ve done work…

Read More
Tags: azureCloud SecurityMicrosoft

Getting Up to Speed on Azure

  • Posted on:April 22, 2014
  • Posted in:Cloud, Partners, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

Microsoft recently held their annual Build conference. The premier developer event for Microsoft is usually quite predictable. You could safely expect a few incremental improvements in various technologies and fantastic developer sessions on current tech. See for yourself; the sessions are online from 2012 and 2013. Things were different this year. I’ll be addressing the…

Read More
Tags: azureMicrosoft

Security Intelligence Blog

  • Necurs Evolves to Evade Spam Detection via Internet Shortcut File
  • Monero-Mining RETADUP Worm Goes Polymorphic, Gets an AutoHotKey Variant
  • XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • The Role That IT Security Teams Need to Play in Connected Hospitals
Elisa Lippincott (TippingPoint Global Product Marketing)
Elisa Lippincott (TippingPoint Global Product Marketing)
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 16, 2018
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Warnings and WannaCry
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Drupal Latest Platform To Be Hit With Critical Vulnerability
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • Today’s Predictions for Tomorrow’s Internet
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • The Risks of Bio-IoT

Follow Us

Trend Micro in the News

  • Graffiti in the digital world: How hacktivists use defacement
  • The connected workforce: The importance of protecting home and corporate networks
  • NIST Cybersecurity Framework Series Part 5: Recover

Trend Micro Blogs

  • Internet Safety for Kids
  • Countermeasures
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.