Over the past four years, many things have changed in our Cloud Security Blog has been online – largely because of the evolution of the industry. No longer are we encountering “cloud confusion,” as a couple of our earlier blog posts on cloud-based security and threats from the cloud discussed. The “Cloud” and security within…
Read MoreIf you still believe that your systems management consoles should be running on servers in your data center, youâre definitely from the pre-cloud era. Even if you believe your systems management and security consoles should be running on infrastructure as a service instances you control, youâre also out of date. The evidence is in, and…
Read MoreAs a Product Marketing Manager for Trend Micro⢠Worry-Free⢠Business Security Services, I hear a lot of objections about the product, and in particular, a lot of cloud-related fears. Some examples of things I hear from customers and partners are: âI wouldnât be secure if my Internet connection went down.â âI donât want to put…
Read MoreSo far in this series, Justin and I have provided tips for securing the foundations of your AWS deployment. Taken together, these tips work to reduce the overall attack surfaceâthe area exposed to the outside worldâof your application. Now it’s time to add the next layer of controls to you application, starting with a host-based…
Read MoreRecently I was honored to give a keynote about the future of cloud security at the Cloud Security Alliance Summit at RSA 2013 . This video is worth your time to watch. It covers a brief history of cloud security, where it is headed, and who it will impact. The bottom line is that no…
Read MoreLast week, Justin covered some of the high level issues around AMI development. This week, we’re going to take a look at how to protect the guest operating system running on your EC2 and VPC instances. AWS Recommendations AWS had published quite a few papers around their services. AWS Security Best Practices [PDF] and AWS Risk and…
Read MorePeople who drive recklessly to the airport, at a high rate of speed while clutching a cellphone to their ear, only to then board the plane and pray it does not crash, often bewilder me. Donât they realize they bear some responsibility for arriving safely at their destination? Trend Microâs webinar on the new PCI…
Read MoreReady to join the conversation? We’re hosting a LIVE TweetChat on December 4, 2012, at 9am PST, to discuss new approaches to the cloud for businesses and how companies can prepare for the next generation of secure cloud computing. Participants: Dave Asprey, Vice President, Cloud Security at Trend Micro (@daveasprey) Stephen Spector, Dell cloud evangelist (@SpectorAtDell) Erica…
Read MoreWhen you host applications in the public cloud, you assume partial responsibility for securing the application. The cloud provider, for example Amazon Web Services (AWS), secures the physical data center (with locked badge entry doors, fences, guards, etc.) in addition to securing the physical network with perimeter firewalls. This is no significant change from how…
Read MoreHere is a carefully assembled list of the most common – and annoying – marketing mistakes made by cloud (or non-cloud) companies. 1) Cloudwashing â treat all cloud stuff the same. Do you mean PaaS, SaaS, IaaS, or private cloudâŚ. or just virtualization? Or maybe your kidâs aquarium service that has a web page with…
Read More