• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   social networking

The State of Cloud Computing Security in Asia

  • Posted on:January 7, 2013
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
1

On a whirlwind tour of Asia, I spoke at several virtual and in-person conferences, including Cloudsec2012. I met with dozens of IT executives responsible for security for cloud infrastructures in Japan and Singapore as well as many other countries in the region. The tour gave me the opportunity to really dig in on cloud security…

Read More
Tags: APACbig datacloud computingcloud platformsCloud Securitycloud-based securityconsumerizationsocial networking

Twitter – How to Stay Happy and Avoid the Scammers and Trolls

  • Posted on:October 15, 2012
  • Posted in:Social
  • Posted by:
    Trend Micro
0

By Aman Chand At Trend Micro we talk a lot about the importance of protecting our digital lives. In today’s web-enabled universe, we do so much online now that it has become second nature to jump on the Internet at a moment’s notice, but it’s easy to let our guard down and forget the risks…

Read More
Tags: AmanAman Chandsocial mediasocial networkingtrend microtwitter

What is Cloudbursting?

  • Posted on:March 15, 2011
  • Posted in:Cloud, Virtualization
  • Posted by:
    Trend Micro
9

Do you know what cloudbursting is? It is a concept where when you run out of your computing resources in your internal data center, you ā€œburstā€ the additional workload to an external cloud on an on-demand basis.

Read More
Tags: cloud computingCloud Securitycloud-based securitydatacenterEC2hypervisorsiaaspaasPrivate CloudPublic CloudsaasSecureCloudsocial networkingstandardsvirtualizationVMs

OpenPaas and CloudBees: Java in the Cloud

  • Posted on:February 28, 2011
  • Posted in:Virtualization
  • Posted by:
    Trend Micro
1

OpenPaas and CloudBees: Java in the Cloud. Is vendor lockin eliminated?

Read More
Tags: APIscloud computingCloud Securitycloud-based securitydatacenterEC2GooglehypervisorsiaasJavaJavaEEMicrosoftpaasPrivate CloudPublic Cloudsaassocial networkingvirtualizationVMs

Good Clouds, Evil Clouds: Why Microsoft Hasn’t Lost Yet in Cloud Computing

  • Posted on:February 6, 2011
  • Posted in:Cybercrime
  • Posted by:
    Dave Asprey
6

In a recent eWeek interview, Citrix CTO Simon Crosby described Conficker malware as ā€œthe world’s largest cloud.ā€ He’s right. Cybercriminals use Conficker to create massive clouds of remotely-controlled PCs capable of carrying out a variety of cyber-attacks, including DDoS (Distributed Denial of Service) attacks on a scale larger than any centralized cloud provider could. We…

Read More
Tags: botnetscloud computingCloud Securitycloud-based securitycybercrimecybercriminalsdatacenterDDoSEC2GoogleGoogle AppsiaasmalwareMicrosoftpaasPrivate CloudPublic CloudsaasSecureCloudsecuritySmart Protection Networksocial networking

London Bridge is Falling Down

  • Posted on:January 11, 2011
  • Posted in:Virtualization
  • Posted by:
    Trend Micro
0

Everyone is familiar with the traditional nursery rhyme, ā€œLondon Bridge is Falling Down.ā€ However, few know that it traces its roots back to a factual wonder of the medieval world.

The original London Bridge struggled from a problem facing the cloud computing model… overcommit. Resource pooling provides fantastic economies of scale, but what happens when everyone needs the resources at the same time? The bridge could support the houses or a massive amount of traffic, just not both.

Read More
Tags: cloud computingCloud SecurityiaaspaasPublic Cloudsaassocial networkingvirtualizationVMs

Why Identity Matters More in the Cloud Than the Enterprise

  • Posted on:December 6, 2010
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

The cloud is putting so much pressure on the old device-centric security model that it’s forcing a change to an identity-centric security model, where it matters far more who a person is than what device or network they are using. In a single day, one person might access cloud applications from his iPhone, home, main office, and Peet’s Coffee, and he may use his home PC, his work laptop, his phone, or even his Xbox. Trying to identify and secure what that person does based on a device IP address or network address is simply a lost cause.

Read More
Tags: cloud computingCloud Securitycloud-based securitydatacenterhosted securityin-the-cloud scanningPrivate CloudPublic CloudSecureCloudsecuritySmart Protection Networksocial networking

DDoS and the Cloud: Sad but True

  • Posted on:October 9, 2009
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

Amazon EC2 customers recently suffered from a concerted Distributed Denial of Service (DDoS) attack that caused some consternation for the web-based code hosting service Bitbucket (news courtesy of my favorite IT tabloid, The Register).Ā  An unfortunate fact of life about the massive DDoS such as Bitbucket appears to have suffered is that there is no…

Read More
Tags: cloud computingDDoShosted securityiaassaassecuritysocial networking

Is ā€œtrust usā€ good enough for private data in the public cloud?

  • Posted on:October 6, 2009
  • Posted in:Cloud
  • Posted by:
    Trend Micro
0

Every day brings more headlines about social networking, cloud computing and Software as a Service (SaaS).Ā  Each of these fast growth areas shares an important element in common – they rely on a movement of data from private computers into the public cloud.Ā  The theory goes that this data is protected by the service provider…

Read More
Tags: APIsCloud SecurityGoogle Appssaassecuritysocial networking

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • New Report: Top Three Ways to Drive Boardroom Engagement around Cybersecurity Strategy
  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.