• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   EC2

Top 10 AWS Security Tips: #6 Secure Your Applications Using a Host-Based Intrusion Prevention System

  • Posted on:March 20, 2013
  • Posted in:Cloud
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

So far in this series, Justin and I have provided tips for securing the foundations of your AWS deployment. Taken together, these tips work to reduce the overall attack surface—the area exposed to the outside world—of your application. Now it’s time to add the next layer of controls to you application, starting with a host-based…

Read More
Tags: AWSAWS risk and complianceaws securityAWS security best practicescloudcloud-based securitycross-site scriptingDeep SecurityDeep Security as a ServiceEC2how to secure AWSiaasintrusion preventionIPSPublic Cloudsecure your applicationSQL injectionVPC

Top 10 AWS Security Tips: #4 Protecting Guest Operating Systems

  • Posted on:March 6, 2013
  • Posted in:Cloud
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

Last week, JustinĀ covered some of the high level issues around AMI development. This week, we’re going to take a look at how to protect the guest operating system running on your EC2 and VPC instances. AWS Recommendations AWS had published quite a few papers around their services. AWS Security Best PracticesĀ [PDF] and AWS Risk and…

Read More
Tags: AWSAWS risk and complianceaws securityAWS security best practicescloudcloud-based securityDeep SecurityDeep Security as a ServiceEC2how to secure AWSiaasPatchpatchingprinciple of least privilegePublic Cloudsecure your applicationvirtual patchingVPC

Did Amazon’s aggressive algorithms prevent customer data loss?

  • Posted on:May 11, 2011
  • Posted in:Cloud
  • Posted by:
    Trend Micro
0

How difficult is it to run a public cloud service? As all of us know, Amazon Web Services (AWS) experienced an outage on 21-Apr-2011 and that lasted for almost 4 days. Quite a lot of companies were affected and you can find the list here. The Internet was flooded with articles speculating what went wrong,…

Read More
Tags: AmazonAWScloud computingCloud Securitycloud-based securitydatacenterDenial of ServiceEBSEC2Private CloudPublic CloudSecureCloudVMs

Should the Amazon Web Services EC2 outage impact cloud adoption?

  • Posted on:April 27, 2011
  • Posted in:Cloud
  • Posted by:
    Trend Micro
0

Last Thursday, April 21, 2011 Amazon Web Services Elastic Compute Cloud (EC2) had an outage that impacted multiple Availability Zones. Thursday morning, Amazon issued a status update indicating that the outage was based on problems with replication mirroring: ā€œThis re-mirroring created a shortage of capacity in one of the US-EAST-1 Availability Zones, which impacted new EBS volume creation as well as the pace with which we could re-mirror and recover affected EBS volumes. Additionally, one of our internal control planes for EBS has become inundated such that it’s difficult to create new EBS volumes and EBS backed instances.ā€

Read More
Tags: cloud computingCloud Securitycloud-based securitydatacenterEC2SecureCloudsecuritySmart Protection Network

The Small Business Journey to the Cloud is Actually a Round Trip

  • Posted on:April 20, 2011
  • Posted in:Virtualization
  • Posted by:
    Greg Boyle
2

The Small Business Journey to the Cloud is Actually a Round Trip Ā Ā Ā Ā  By Greg Boyle, Trend Micro Global Product Marketing Manager Many small businesses are still uncertain about cloud computing. They wonder if it can help with their profitability without being extremely risky. Let’s start by defining cloud computing in small business terms. There…

Read More
Tags: cloud computingCloud Securitycloud-based securitydatacenterEC2iaasmobile devicespaasPrivate CloudPublic CloudsaassecuritySmart Protection Networkvirtualization

Scalability Testing In The Cloud

  • Posted on:April 18, 2011
  • Posted in:Virtualization
  • Posted by:
    Trend Micro
1

Not long ago, we set out on a mission to perform a full scalability test on one of our products (Trend Micro Deep Security). After some quick, back-of-the-napkin calculations we discovered that we needed somewhere in the order of 35 Dell 710’s with virtualization to complete our test. Finding that many available servers is a…

Read More
Tags: cloud computingCloud Securitycloud-based securitydatacenterEC2iaasin-the-cloud scanningpaasvirtualization

Dedicated Servers vs. the New Amazon EC2 Dedicated Instance

  • Posted on:March 28, 2011
  • Posted in:Virtualization
  • Posted by:
    Dave Asprey
4

Dedicated Instances are Amazon EC2 instances launched within your Amazon Virtual Private Cloud (Amazon VPC) that run hardware dedicated to a single customer.

Of course, the humor here is that Amazon didn’t explain which hardware it was referring to. If you compare it to an enterprise server in a private data center, it’s clearly less secure (unless you applied cloud specific security and encryption tools perhaps). But if you compare it to existing hosting offering, it’s no less secure than enterprise grade hosting has been for a decade.

Read More
Tags: cloud computingCloud Securitycloud-based securitydatacenterEC2iaasPublic CloudSmart Protection Networkstoragevirtualization

Encryption in the Public Cloud: Advice for Security Techniques

  • Posted on:March 23, 2011
  • Posted in:Virtualization
  • Posted by:
    Dave Asprey
0

Surveys indicate that security is the number 1 challenge about the cloud.Ā  Using encrypted, self-defending hosts mitigates many security-in-the-cloud issues.Ā  Dave Asprey, VP-Cloud Security for Trend Micro,Ā presented to the SD Forum theseĀ 16 valuable points of advice regarding data privacy in the cloud.Ā  PLEASE CLICK ON THE “READ MORE” BUTTON TO ADVANCE DIRECTLY TO THE PRESENTATION….

Read More
Tags: cloud computingCloud Securitycloud-based securityEC2Encryptionhosted securityhypervisorsPublic CloudSecureCloudsecurity

What is Cloudbursting?

  • Posted on:March 15, 2011
  • Posted in:Cloud, Virtualization
  • Posted by:
    Trend Micro
9

Do you know what cloudbursting is? It is a concept where when you run out of your computing resources in your internal data center, you ā€œburstā€ the additional workload to an external cloud on an on-demand basis.

Read More
Tags: cloud computingCloud Securitycloud-based securitydatacenterEC2hypervisorsiaaspaasPrivate CloudPublic CloudsaasSecureCloudsocial networkingstandardsvirtualizationVMs

OpenPaas and CloudBees: Java in the Cloud

  • Posted on:February 28, 2011
  • Posted in:Virtualization
  • Posted by:
    Trend Micro
1

OpenPaas and CloudBees: Java in the Cloud. Is vendor lockin eliminated?

Read More
Tags: APIscloud computingCloud Securitycloud-based securitydatacenterEC2GooglehypervisorsiaasJavaJavaEEMicrosoftpaasPrivate CloudPublic Cloudsaassocial networkingvirtualizationVMs
Page 1 of 212

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • New Report: Top Three Ways to Drive Boardroom Engagement around Cybersecurity Strategy
  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.