• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   shared responsiblity

Shared Responsibility Examples: Shellshock

  • Posted on:November 12, 2014
  • Posted in:Cloud Security, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

This is the 4th & final post in a short series on the shared responsibility model for security in the AWS Cloud. Please take a few minutes to read the others: part 1, part 2, and part 3 Shellshock Shellshock (which entails a number of CVE’s), is a bug that affects bash, a command line…

Read More
Tags: AWSAWS best practicesshared responsiblity

Shared Responsibility Examples: POODLE

  • Posted on:November 5, 2014
  • Posted in:Cloud Security, Security
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
0

This is the third post in a short series on the shared responsibility model for security in the AWS Cloud. Please take a couple of minutes to read part 1 and part 2. POODLE Another bug with a catchy name, POODLE, is actually an acronym. It stands for “padding oracle on downgrade legacy encryption.” This…

Read More
Tags: AWSAWS best practicesshared responsiblity

The Cloud’s Shared Risk Model

  • Posted on:February 21, 2013
  • Posted in:Cloud
  • Posted by:
    Trend Micro
0

People who drive recklessly to the airport, at a high rate of speed while clutching a cellphone to their ear, only to then board the plane and pray it does not crash, often bewilder me. Don’t they realize they bear some responsibility for arriving safely at their destination? Trend Micro’s webinar on the new PCI…

Read More
Tags: access controlAmazonAmazon EC2amazon web servicesAWSaws securitycloudCloud Securityhow to secure AWSidentity managementPublic Cloudsecurity modelshared responsiblityshared risk

Top 10 AWS Security Tips: #2 Password Policies and Multi-Factor Authentication

  • Posted on:February 20, 2013
  • Posted in:Cloud
  • Posted by:
    Mark Nunnikhoven (Vice President, Cloud Research)
2

In last week’s post, Protecting your resources with AWS Identity and Access Management, Justin covered the basics of AWS Identity Access Management (IAM). This week, we’re going to take a look at password policies and multi-factor authentication using IAM. Password Policies The value of a strong passwords is well known. Most organizations already have a password…

Read More
Tags: account managementAWSAWS account managementAWS IAM best practicesCloud SecurityDeep Security as a Servicehow to secure AWSIAMidentity managementMFAmulti-factor authenticationsecuring AWSshared responsiblity

Top 10 AWS Security Tips: #1 Using IAM To Protect Your Resources

  • Posted on:February 13, 2013
  • Posted in:Cloud
  • Posted by:
    Trend Micro
4

Over the next several weeks, we will be discussing best practices for securing your Amazon Web Services (AWS) environment. Before we dive into securing your instances, applications and data, we have to start from the top. As part of the AWS shared responsibility security model, consumers of AWS play a significant role in securing their…

Read More
Tags: account managementAWSAWS account managementAWS IAM best practicesCloud SecurityDeep Security as a Servicehow to secure AWSIAMidentity managementsecuring AWSshared responsiblity

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRN® Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Nuffield Health Depends on Managed XDR with Trend Micro Vision One
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.