• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   cloud

For all your cloud security needs…

  • Posted on:July 11, 2013
  • Posted in:Cloud
  • Posted by:
    Trend Micro
1

Over the past four years, many things have changed in our Cloud Security Blog has been online – largely because of the evolution of the industry. No longer are we encountering “cloud confusion,” as a couple of our earlier blog posts on cloud-based security and threats from the cloud discussed. The “Cloud” and security within…

Read More
Tags: cloudcloud computingCloud Securitycloud-based securitysecurity

Why It’s Time to Manage Your Networking and Security from the Cloud

  • Posted on:April 30, 2013
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

If you still believe that your systems management consoles should be running on servers in your data center, you’re definitely from the pre-cloud era. Even if you believe your systems management and security consoles should be running on infrastructure as a service instances you control, you’re also out of date. The evidence is in, and…

Read More
Tags: AWSCiscocloudcloud managementCloud SecurityDeep Security as a ServiceIT managementMerakisaassystems management

Why are you scared of the cloud?

  • Posted on:April 15, 2013
  • Posted in:Cloud
  • Posted by:
    Ryan Delany
1

As a Product Marketing Manager for Trend Micro™ Worry-Free™ Business Security Services, I hear a lot of objections about the product, and in particular, a lot of cloud-related fears. Some examples of things I hear from customers and partners are: “I wouldn’t be secure if my Internet connection went down.” “I don’t want to put…

Read More
Tags: Appleclientcloudcloud computingCloud Securitycloud storagedata protectionGoogleIT managementNetflixscared of the cloudsecure cloudsmall business cloud

Top 10 AWS Security Tips: #6 Secure Your Applications Using a Host-Based Intrusion Prevention System

  • Posted on:March 20, 2013
  • Posted in:Cloud
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

So far in this series, Justin and I have provided tips for securing the foundations of your AWS deployment. Taken together, these tips work to reduce the overall attack surface—the area exposed to the outside world—of your application. Now it’s time to add the next layer of controls to you application, starting with a host-based…

Read More
Tags: AWSAWS risk and complianceaws securityAWS security best practicescloudcloud-based securitycross-site scriptingDeep SecurityDeep Security as a ServiceEC2how to secure AWSiaasintrusion preventionIPSPublic Cloudsecure your applicationSQL injectionVPC

Keynote Video from RSA: Why the Cloud Manages Security Better Than You Do

  • Posted on:March 14, 2013
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

Recently I was honored to give a keynote about the future of cloud security at the Cloud Security Alliance Summit at RSA 2013 . This video is worth your time to watch. It covers a brief history of cloud security, where it is headed, and who it will impact. The bottom line is that no…

Read More
Tags: cloudcloud predictionscloud presentationCloud Securitycloud security presentationCSA Summit at RSACSA Summit keynoteCSA Summit presentationDave Aspreyfuture of cloud securitykeynotepredictionsRSA 2013

Top 10 AWS Security Tips: #4 Protecting Guest Operating Systems

  • Posted on:March 6, 2013
  • Posted in:Cloud
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

Last week, Justin covered some of the high level issues around AMI development. This week, we’re going to take a look at how to protect the guest operating system running on your EC2 and VPC instances. AWS Recommendations AWS had published quite a few papers around their services. AWS Security Best Practices [PDF] and AWS Risk and…

Read More
Tags: AWSAWS risk and complianceaws securityAWS security best practicescloudcloud-based securityDeep SecurityDeep Security as a ServiceEC2how to secure AWSiaasPatchpatchingprinciple of least privilegePublic Cloudsecure your applicationvirtual patchingVPC

The Cloud’s Shared Risk Model

  • Posted on:February 21, 2013
  • Posted in:Cloud
  • Posted by:
    Trend Micro
0

People who drive recklessly to the airport, at a high rate of speed while clutching a cellphone to their ear, only to then board the plane and pray it does not crash, often bewilder me. Don’t they realize they bear some responsibility for arriving safely at their destination? Trend Micro’s webinar on the new PCI…

Read More
Tags: access controlAmazonAmazon EC2amazon web servicesAWSaws securitycloudCloud Securityhow to secure AWSidentity managementPublic Cloudsecurity modelshared responsiblityshared risk

TweetChat: Approaching Tomorrow’s Cloud

  • Posted on:December 3, 2012
  • Posted in:Cloud
  • Posted by:
    Trend Micro
3

Ready to join the conversation? We’re hosting a LIVE TweetChat on December 4, 2012, at 9am PST, to discuss new approaches to the cloud for businesses and how companies can prepare for the next generation of secure cloud computing. Participants: Dave Asprey, Vice President, Cloud Security at Trend Micro (@daveasprey) Stephen Spector, Dell cloud evangelist (@SpectorAtDell) Erica…

Read More
Tags: #TrendChatcloudcloud computingCloud SecurityDellfuture of cloudPrivate CloudPublic Cloudtwittertwitter chat

Security in the cloud is a shared responsibility

  • Posted on:November 28, 2012
  • Posted in:Cloud
  • Posted by:
    Trend Micro
2

When you host applications in the public cloud, you assume partial responsibility for securing the application. The cloud provider, for example Amazon Web Services (AWS), secures the physical data center (with locked badge entry doors, fences, guards, etc.) in addition to securing the physical network with perimeter firewalls. This is no significant change from how…

Read More
Tags: amazon web servicesAWScloudCloud Securitysecurity

The Top Eight Most Annoying Cloud Marketing Mistakes

  • Posted on:November 22, 2012
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
1

Here is a carefully assembled list of the most common – and annoying – marketing mistakes made by cloud (or non-cloud) companies. 1) Cloudwashing – treat all cloud stuff the same. Do you mean PaaS, SaaS, IaaS, or private cloud…. or just virtualization? Or maybe your kid’s aquarium service that has a web page with…

Read More
Tags: akamaiAmbient cloudambient cloudscloudcloud mythsCloud Securitymarketingmarketing mistakes
Page 2 of 4 ‹ 123 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Cloud-based Email Threats Capitalized on Chaos of COVID-19
  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.