Quantcast
Channel: Trend Cloud Security Blog - Cloud Computing Experts » Threats from the Cloud
Browsing all 11 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Devops Does Not Make for Secure Ops

In our hectic cloud-based world, devops (the mixing of infrastructure operations with software development) has become the standard way we build and run high-scale sites from IaaS to SaaS. There are...

View Article



Image may be NSFW.
Clik here to view.

Encryption in the Public Cloud: Advice for Security Techniques

Surveys indicate that security is the number 1 challenge about the cloud.  Using encrypted, self-defending hosts mitigates many security-in-the-cloud issues.  Dave Asprey, VP-Cloud Security for Trend...

View Article

Image may be NSFW.
Clik here to view.

New type of cloud emerges: Exploits as a Service (EaaS)

For years now, if you knew where to shop on the shady side of the Internet cloud, you could pick up a botnet for cheap. But it was so much work to log in to IRC and pay with egold that a busy...

View Article

Image may be NSFW.
Clik here to view.

The Small Business Journey to the Cloud is Actually a Round Trip

The Small Business Journey to the Cloud is Actually a Round Trip      By Greg Boyle, Trend Micro Global Product Marketing Manager Many small businesses are still uncertain about cloud computing. They...

View Article

Image may be NSFW.
Clik here to view.

Chrome OS: So secure we don’t need security?

With the launch announcements of various Google Chrome netbooks, the focus of the press and security companies alike is beginning to take a closer look at the security promises made and also at some of...

View Article


Image may be NSFW.
Clik here to view.

Ambient Cloud News: Skype protocol has been reverse engineered

This is pretty cool. I gave a talk last week at the Glue Conference in Denver about how ambient clouds ( http://cloud.trendmicro.com/good-clouds-evil-clouds-why-microsoft-has… )work and even used Skype...

View Article

Image may be NSFW.
Clik here to view.

The State of Cloud and Virtualization Security

For the last few months, we’ve been conducting a cloud, virtualization, and VDI security survey of 1200 IT professionals from larger companies in 6 countries around the world. Not only did I get to...

View Article

Image may be NSFW.
Clik here to view.

Why Apple Should Release iFurnace Powered by iCloud: Another Case for Ambient...

Check out the linked article from popsci.com. It reviews how researchers at Microsoft propose using servers installed in office buildings and apartments as “data furnaces” to keep people warm,...

View Article


Image may be NSFW.
Clik here to view.

What Are the True Dangers of the Cloud?

We often hear that security and privacy concerns are the main inhibitors to cloud adoption.  But what are the true threats?  Is the cloud really more dangerous than your on-site data center?  I would...

View Article


Image may be NSFW.
Clik here to view.

Beyond Perimeter Defense to Data-Centric Security

Traditionally businesses have focused their IT security on perimeter defense—blocking threats before they enter the network. This protection is still important.  But with today’s cloud computing,...

View Article

For all your cloud security needs…

Over the past four years, many things have changed in our Cloud Security Blog has been online – largely because of the evolution of the industry. No longer are we encountering “cloud confusion,” as a...

View Article
Browsing all 11 articles
Browse latest View live




Latest Images