• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Elisa Lippincott
    • Mark Nunnikhoven
    • Jon Clay
  • Research
Home   »   cloud computing

Facilitating safer cloud migrations

  • Posted on:March 7, 2013
  • Posted in:Cloud Computing, Cybercrime
  • Posted by:
    Trend Micro
0

Companies and individuals everywhere have surely heard about cloud computing in some way by now, but not everyone knows how to make sure that cloud security can be safely implemented from the start. Gordon Makryllos wrote on CSO Online that only a few people truly understand what is needed from them at the start of their journey into the cloud.

Read More
Tags: cloud computingcybercrime

Cloud helping to improve security policies

  • Posted on:March 4, 2013
  • Posted in:Cloud Computing, Cybercrime, Privacy & Policy
  • Posted by:
    Trend Micro
0

Although there are still concerns by companies and individuals about cloud security, they may all be unfounded. Paul Rubens wrote on eSecurity Planet that the cloud, while it has not eliminated cyber threats, has given businesses a powerful new weapon for effectively fighting it, even when they may not have the biggest IT department in the world.

Read More
Tags: cloud computingcybercrimePrivacy & Policy

BYOD introduces novel legal challenges to IT

  • Posted on:March 4, 2013
  • Posted in:Cloud Computing, Privacy & Policy
  • Posted by:
    Trend Micro
0

While many companies have been worried about the security risks of implementing a BYOD (Bring your own Device) program, there are several legal obligations which should be addressed first.

Read More
Tags: cloud computingPrivacy & Policy

New cloud means new policies, changes

  • Posted on:February 26, 2013
  • Posted in:Cloud Computing, Privacy & Policy
  • Posted by:
    Trend Micro
0

The adoption of cloud computing means a lot of positive things for businesses that do it correctly.

Read More
Tags: cloud computingPrivacy & Policy

PCI Council issues new guidelines for the cloud

  • Posted on:February 21, 2013
  • Posted in:Cloud Computing, Current News
  • Posted by:
    Trend Micro
0

The PCI Council rolled out some new guidelines on cloud security when dealing with credit card and payment information and said dealing with introspection may be the big issue that companies will have to worry about.

Read More
Tags: cloud computingCloud SecurityCurrent News

Staying secure in healthcare with the cloud

  • Posted on:February 8, 2013
  • Posted in:Cloud Computing, Compliance & Regulations
  • Posted by:
    Trend Micro
0

For industries like healthcare, there is no doubt cloud computing can be a positive force if done correctly. Cloud-based electronic health record, for example, can give doctors a better ability to access records quickly, understand their patients and more easily diagnose diseases.

Read More
Tags: cloud computingCompliance & Regulations

Cloud standards progress coming up from below

  • Posted on:February 4, 2013
  • Posted in:Cloud Computing, Compliance & Regulations
  • Posted by:
    Trend Micro
0

The cloud computing industry has been gaining steam, but one area where it severely lacks for such a gigantic force is standardization. There is no singular set of laws, rules or regulations that businesses and industries follow and Joe Masters Emison wrote on InformationWeek that there is a growing demand for this to help “bring some sanity” to the market.

Read More
Tags: cloud computingCompliance & Regulations

Need to Know Now: Cloud Economics

  • Posted on:February 1, 2013
  • Posted in:Cloud
  • Posted by:
    Trend Micro
0

Is your cloud economic strategy a little…foggy? In this recent webcast from Dell, Trend Micro VP of Cloud Security Dave Asprey talks with Matthew Mikell, Cloud Evangelist at Dell, and David Linthicum, CTO and founder of Blue Mountain Labs to help business discover how to create the best financial model for their cloud computing strategy: Video…

Read More
Tags: Blue Mountain Labscloud computingcloud economicscloud financial modelingcloud financial modellingcloud financial modelsDave AspreyDavid LinthicumDellhow toMatthew Mikellpractical IT

The State of Cloud Computing Security in Asia

  • Posted on:January 7, 2013
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
1

On a whirlwind tour of Asia, I spoke at several virtual and in-person conferences, including Cloudsec2012. I met with dozens of IT executives responsible for security for cloud infrastructures in Japan and Singapore as well as many other countries in the region. The tour gave me the opportunity to really dig in on cloud security…

Read More
Tags: APACbig datacloud computingcloud platformsCloud Securitycloud-based securityconsumerizationsocial networking

Avoid the downfalls of cloud computing

  • Posted on:January 4, 2013
  • Posted in:Cloud Computing, Privacy & Policy
  • Posted by:
    Trend Micro
0

Companies everywhere have largely gotten over their fears of cloud computing and moved onto implementation strategy discussions, but amid this transition there are some firms that are frankly too eager to get their feet wet in the cloud.

Read More
Tags: cloud computingPrivacy & Policy
Page 3 of 14 « ‹ 234 › »

Security Intelligence Blog

  • Monero-Mining RETADUP Worm Goes Polymorphic, Gets an AutoHotKey Variant
  • XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing
  • XTRAT and DUNIHI Backdoors Bundled with Adwind in Spam Mails

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • The Role That IT Security Teams Need to Play in Connected Hospitals
Elisa Lippincott (TippingPoint Global Product Marketing)
Elisa Lippincott (TippingPoint Global Product Marketing)
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 16, 2018
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Warnings and WannaCry
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Drupal Latest Platform To Be Hit With Critical Vulnerability
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • Today’s Predictions for Tomorrow’s Internet
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • The Risks of Bio-IoT

Follow Us

Trend Micro in the News

  • The connected workforce: The importance of protecting home and corporate networks
  • NIST Cybersecurity Framework Series Part 5: Recover
  • NIST Cybersecurity Framework Series Part 4: Respond

Trend Micro Blogs

  • Internet Safety for Kids
  • Countermeasures
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.