• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   SecureCloud

Cloud-First but Not Cloud-Only: Why Organizations Need to Simplify Cybersecurity

  • Posted on:April 2, 2020
  • Posted in:Cloud, Cloud Security
  • Posted by:
    Wendy Moore
0

The global public cloud services market is on track to grow 17% this year, topping $266 billion. These are impressive figures, and whatever Covid-19 may do short-term to the macro-economy, they’re a sign of where the world is heading. But while many organizations may describe themselves as “cloud-first”, they’re certainly not “cloud-only.” That is, hybrid…

Read More
Tags: Private CloudPublic CloudSecureCloudsecurity

Architecting Highly Secure Applications on AWS

  • Posted on:August 23, 2013
  • Posted in:Cloud
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

AWS re:Invent This year, AWS re:Invent is once again being held in Las Vegas (12–15-Nov-2013). The 4 day conference focuses on all things AWS and the schedule is packed with talks, bootcamps, hands-on labs, and other events. If you didn’t attend last year, you can check out the videos online to get a feel for the…

Read More
Tags: AmazonAWSCloud SecurityDeep Security as a ServiceiaasSecureCloud

Do You Encrypt Your Data? A Plea to Businesses from an Identity Theft Victim

  • Posted on:February 2, 2012
  • Posted in:Cybercrime
  • Posted by:
    Trend Micro
1

Recently I became a victim of identity theft.  Criminals gained access to my name, address, date of birth, driver’s license number, social security number, and bank account number.  I’ve spent the last 10 years marketing Internet security solutions, but now I know firsthand how painful it can be to individuals when a data breach occurs….

Read More
Tags: cloud computingCloud SecuritycompliancecybercrimecybercriminalsEncryptionSecureCloudsecuritythreats

Government Data Seizures is Only One Type of Data Loss

  • Posted on:January 18, 2012
  • Posted in:Cloud
  • Posted by:
    Trend Micro
1

Dave Asprey and Jonathan Gershater bring up good points in their blog posts about the USA PATRIOT Act (“The USA PATRIOT Act is Bad for Business” and “Patriot Act is not the first (nor likely) last law of its kind”).  The U.S. might seize your data or other governments might gain access for a multitude of…

Read More
Tags: cloud computingCloud SecuritycompliancecybercrimeEncryptionPublic CloudSecureCloud

Encryption is Not Enough for Cloud Security

  • Posted on:September 1, 2011
  • Posted in:Cloud
  • Posted by:
    Trend Micro
5

By saying that encryption is not enough for cloud security, I don’t mean that you also need other types of protection like server security, identity management, etc.  I think most people deploying cloud computing plan to implement more than encryption for security.  What I mean is that encryption alone is not enough in an encryption…

Read More
Tags: cloud computingCloud SecurityDeep SecurityEncryptioniaasPrivate CloudPublic CloudSecureCloud

Fighting Application Level DDoS Attacks Using Ambient Clouds – New Idea

  • Posted on:July 28, 2011
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
3

The application-layer DDoS threat actually amplifies the risk to data center operators. That’s because IPS devices and firewalls become more vulnerable to the increased state demands of this emerging attack vector – making the devices themselves more susceptible to the attacks. Moreover, there is a distinct gap in the ability of existing edge-based solutions to…

Read More
Tags: cloud computingCloud Securitycloud-based securitySecureCloud

“Hey, You, Get Off of iCloud!”

  • Posted on:June 20, 2011
  • Posted in:Virtualization
  • Posted by:
    Patrick Wheeler
2

For all its hype iCloud does not represent a fundamentally new problem. Employees are already bringing personal devices to work and wanting to use them in their jobs, and these unmanaged devices are mixing personal and corporate data on a system that is outside the control of the security and IT teams. There are already…

Read More
Tags: cloud computingCloud Securitycloud-based securitycomplianceGoogleIT Consumerizationmobile devicesportabilityPrivacyPublic CloudSecureCloudstandards

The State of Cloud and Virtualization Security

  • Posted on:June 5, 2011
  • Posted in:Cybercrime, Virtualization
  • Posted by:
    Dave Asprey
1

For the last few months, we’ve been conducting a cloud, virtualization, and VDI security survey of 1200 IT professionals from larger companies in 6 countries around the world. Not only did I get to help shape the questions on the survey, I’ve also been on the team interpreting the results. We’ve learned more than a…

Read More
Tags: cloud computingCloud Securitycloud-based securityDeep SecurityEncryptionhosted securityin-the-cloud scanningmalwaremobile devicesPrivacyPrivate CloudPublic CloudSecureCloudsecuritySmart Protection NetworkthreatsVulnerabilities

Ambient Cloud News: Skype protocol has been reverse engineered

  • Posted on:June 2, 2011
  • Posted in:Cybercrime
  • Posted by:
    Dave Asprey
0

This is pretty cool. I gave a talk last week at the Glue Conference in Denver about how ambient clouds ( http://cloud.trendmicro.com/good-clouds-evil-clouds-why-microsoft-has… )work and even used Skype as an example of a massive-scale ambient cloud.

This case raises some very important new questions around ambient clouds.

Read More
Tags: Ambient cloudbotnetscloud computingCloud Securitycloud-based securityDDoSiaasPrivate CloudPublic CloudSecureCloudsecuritySmart Protection NetworkthreatsvirtualizationVulnerabilities

Chrome OS: So secure we don’t need security?

  • Posted on:May 31, 2011
  • Posted in:Cybercrime
  • Posted by:Rik Ferguson (VP, Security Research)
2

With the launch announcements of various Google Chrome OS netbooks, the focus of the press and security companies alike is beginning to take a closer look at the security promises made and also at some of the more ’media friendly‘ statements such as, “…users don’t have to deal with viruses, malware and security updates”.

Read More
Tags: Chrome OSChrome OS securityCloud Securitycloud-based securitycybercrimecybercriminalsGoogleGoogle AppsGoogle ChromeGoogle Chrome netbooksGoogle Chrome OSGoogle Chrome OS netbooksGoogle Chrome OS securitymalwaremobile devicesportabilitySecureCloudsecuritySmart Protection NetworkthreatsVulnerabilities
Page 1 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Trend Micro Asks Students How Their Relationship to the Internet Has Changed During COVID-19
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.