Justin Foster in
Cloud-based Security, Threats from the Cloud
Jul 11th, 2013 |
Over the past four years, many things have changed in our Cloud Security Blog has been online – largely because of the evolution of the industry. No longer are we encountering “cloud confusion,” as a couple of our earlier blog posts on cloud-based security and threats from the cloud discussed.
The “Cloud” and security within it has evolved to the point where there are dozens of events, loads of resources and even a cloud security certification. Allow us to clear up the confusion of the wealth of information available for cloud security across the Web and around...
Justin Foster in
Cloud, Cloud-based Security
Jun 4th, 2013 |
The Cloud Security Alliance recently released a white paper on cloud computing vulnerability incidents spanning the last five years. They looked at more than 11 thousand news articles regarding cloud computing-related incidents to determine the top reasons behind outages. Did you know 64 percent of the outages can be attributed to one of three causes:
Insecure Interfaces & APIs
Data Loss & Leakage
If you are developing an application for the cloud or deploying software in the cloud, there is good news: There are some key ways to avoid the majority of outages.
Ryan Delany in
Apr 15th, 2013 |
As a Product Marketing Manager for Trend Micro™ Worry-Free™ Business Security Services, I hear a lot of objections about the product, and in particular, a lot of cloud-related fears. Some examples of things I hear from customers and partners are:
“I wouldn’t be secure if my Internet connection went down.”
“I don’t want to put all my data in the cloud.”
“I don’t want to waste all my bandwidth, uploading everything to the cloud to be scanned.”
The cloud is becoming better understood by the average person these days, thanks to companies like Google, Apple, Netflix, and other...
Erica Benton in
Feb 1st, 2013 |
Is your cloud economic strategy a little…foggy? In this recent webcast from Dell, Trend Micro VP of Cloud Security Dave Asprey talks with Matthew Mikell, Cloud Evangelist at Dell, and David Linthicum, CTO and founder of Blue Mountain Labs to help business discover how to create the best financial model for their cloud computing strategy:
Video streaming by Ustream
What cloud financial model fits your company?
Dave Asprey in
Jan 7th, 2013 |
On a whirlwind tour of Asia, I spoke at several virtual and in-person conferences, including Cloudsec2012. I met with dozens of IT executives responsible for security for cloud infrastructures in Japan and Singapore as well as many other countries in the region. The tour gave me the opportunity to really dig in on cloud security in that area, enough so that I wrote a new report titled The State of Cloud Computing Security in Asia.
This report goes into detail on how the development of cloud computing is impacting the Asia-Pacific region. Specifically, we compare Japan, Australia, Singapore, Malaysia,...
Dave Asprey in
Dec 18th, 2012 |
Cyber criminals go to where the data is. More and more data is moving to the cloud, so more attacks are moving to the cloud. That’s not to say that mobile devices aren’t a great way to attack the cloud…they are. However, since more critical data is moving to the cloud, we will see a lot of developments in terms of cloud security.
As businesses become better at identifying the strengths and weaknesses of public clouds, private clouds (or just plain virtualization) will continue to be the cost-effective choice for large enterprise stable workloads, with new, variable usage, public...
Erica Benton in
Dec 3rd, 2012 |
Ready to join the conversation? We’re hosting a LIVE TweetChat on December 4, 2012, at 9am PST, to discuss new approaches to the cloud for businesses and how companies can prepare for the next generation of secure cloud computing.
Dave Asprey, Vice President, Cloud Security at Trend Micro (@daveasprey)
Stephen Spector, Dell cloud evangelist (@SpectorAtDell)
Erica Benton (moderating as @TrendMicro)
How you can participate – and WIN!
Please use the hashtag #TrendChat on Twitter to send your questions to Dave and Stephen. We’ll be accepting questions...
Jonathan Gershater in
Nov 30th, 2012 |
In his 90 minute keynote address at the AWS re:Invent conference, Andy Jassy quite unabashedly gave these reasons for using AWS versus a private cloud, (at the 32 minute mark) :
So public cloud adoption should be a no-brainer, right? Oh wait, but Andy omitted security in the public cloud – how can I trust that my customers’ sensitive data is secure in the public cloud?
Been there, heard that before.
I agree, the message wears thin that enterprise businesses are apprehensive to store sensitive customer data in the public cloud, and thus hesitant to adopt the cloud at all. (By...
Amy Luby in
Cloud, Cloud-based Security, Consumerization of IT
Nov 13th, 2012 |
The benefits of the cloud have been proven for businesses of all sizes – every small business owner can save time and money while increasing their employees’ productivity by leveraging cloud technologies. Cloud technologies are faster to deploy, require minimal technical know how to manage, and cost less than on-premise technologies. These benefits let the small business owner focus on what’s most important: growing their business.
But data breaches, social security card theft, credit card number theft, and identity theft: we hear about these things every day. What does the small business...
Dave Asprey in
Nov 1st, 2012 |
If you haven’t seen this fantastic video about online security and mind reading, it’s totally worth 2.5 minutes of your time. Brought to you by a Safe Internet Banking initiative out of Belgium, my ancestral homeland-home of waffles, lace doilies, and diamonds.
The bottom line of the video is that if you put your personal data in social networking and cloud-based services, it’s going to be visible…and not just to marketers. This is why every machine in my house is protected (yes, by Trend Micro Titanium; I do work there…and it’s got the best detection rate)....