Dave Asprey in
Sep 25th, 2012 |
The International Telecommunications Union (ITU) has predicted that, in just eight years, there will be in upwards of 25 billion devices connected to the internet, which was announced in its annual The State of Broadband report.
As a point of reference, the iPhone 5 broke the 5 million unit threshold in three days. To sell 25 billion iPhone 5′s, it would take 41 years at the current rate which it is selling (sorry, Tim Cook, this is only hypothetical).
ITU also predicts that attached to these 25 billion devices, there will be at least ten billion mobile broadband connections, primarily connecting...
Erica Benton in
Sep 19th, 2012 |
Upcoming Change to the Cloud Security Blog – the new Trend Micro consolidated Blog site
Starting today, Trend Micro is launching the Blog@ Trend Micro site, which will showcase the Cloud Security Blog, alongside all the other great content produced by the other teams here at Trend Micro. Each of the blogs will be a “conversation” under the main Trend Micro blog, making it easier for readers to access and participate in discussions across a range of topics.
Our dear readers can still count on receiving the same top-quality news, information, and commentary on the latest in cloud security...
Dave Asprey in
Ambient Cloud, Cloud, Securing the Cloud
Sep 18th, 2012 |
Previous post: Ambient Cloud: Who is responsible for securing the cloud?
We have mentioned that the enterprise is responsible for securing their own cloud and can give access to providers to assist in securing their cloud. (For an additional premium, of course.)
But how should you approach security? There might be problems.
1. Extend your perimeter to the Cloud
Contrary what many are saying, the perimeter-based security model is not dead at all. When dealing with the cloud, enterprises still have the notion of a perimeter. The choice for firms is whether they extend that perimeter into the...
Jonathan Gershater in
Cloud, Cloud-based Security, public cloud, Securing the Cloud, Security
Sep 17th, 2012 |
Consumers are understandably hesitant about using applications and storing data in the public cloud. Concerns such as: “Is my data secure?” “Who has access to my data?” “What happens if the public cloud provider suffers a breach?” or “Who is responsible if my data is exposed?” are common as they consider making the journey to the cloud.
Despite an inherent loss of control with cloud computing, the consumer still bears some responsibility for their use of these services.
The Cloud Standards Customer Council published the “Security for Cloud Computing: 10 Steps to Ensure Success”...
Erica Benton in
Sep 14th, 2012 |
When news broke last week that one million Apple UDIDs had been stolen by hacktivists, users panicked: What is a UDID? How did personally identifiable info get leaked along with the UDIDs? How can I protect my personally identifiable information?
What is a UDID?
On its own, the UDID is just a glorified unique serial number for all iPhones, iPads and iPod Touches, consisting of a long string of numbers and letters. As such, it’s virtually useless to a hacker and no privacy or security threat to a user. It has, until recently, been freely available to developers – collected without permission...
Eva Chen in
Sep 7th, 2012 |
Like many of you, I saw today’s news of Google’s announced acquisition of VirusTotal. I had some thoughts that I wanted to share about this.
Quite simply, I think this is excellent news for Trend Micro, for the industry and everyone.
Why is that, you might ask?
First, Google is definitely not trying to make money from stand-alone security. Google acquired Postini, an email security company, for $625 million in 2007, but they recently announced that they will be retiring Postini, and will instead be offering its security and archiving features in some of their Google Apps products...
Dave Asprey in
Sep 4th, 2012 |
In the world of security professionals, we’re all abuzz about the fact that 1 million Apple devices had their UDIDs leaked by a group called AntiSec. It’s barely news anymore when a hacker makes off with a list of customer information from a poorly protected enterprise, but it’s *definitely* news when an FBI agent’s laptop gets compromised, and we learn it contains (allegedly) more than 12 million device IDs, along with associated personal information. Antisec leaked 1 million of the 12 million after claiming it had removed some identifiable information from the list, but...