Devops Does Not Make for Secure Ops
In our hectic cloud-based world, devops (the mixing of infrastructure operations with software development) has become the standard way we build and run high-scale sites from IaaS to SaaS. There are...
View ArticleEncryption in the Public Cloud: Advice for Security Techniques
Surveys indicate that security is the number 1 challenge about the cloud. Using encrypted, self-defending hosts mitigates many security-in-the-cloud issues. Dave Asprey, VP-Cloud Security for Trend...
View ArticleNew type of cloud emerges: Exploits as a Service (EaaS)
For years now, if you knew where to shop on the shady side of the Internet cloud, you could pick up a botnet for cheap. But it was so much work to log in to IRC and pay with egold that a busy...
View ArticleThe Small Business Journey to the Cloud is Actually a Round Trip
The Small Business Journey to the Cloud is Actually a Round Trip By Greg Boyle, Trend Micro Global Product Marketing Manager Many small businesses are still uncertain about cloud computing. They...
View ArticleChrome OS: So secure we don’t need security?
With the launch announcements of various Google Chrome netbooks, the focus of the press and security companies alike is beginning to take a closer look at the security promises made and also at some of...
View ArticleAmbient Cloud News: Skype protocol has been reverse engineered
This is pretty cool. I gave a talk last week at the Glue Conference in Denver about how ambient clouds ( http://cloud.trendmicro.com/good-clouds-evil-clouds-why-microsoft-has… )work and even used Skype...
View ArticleThe State of Cloud and Virtualization Security
For the last few months, we’ve been conducting a cloud, virtualization, and VDI security survey of 1200 IT professionals from larger companies in 6 countries around the world. Not only did I get to...
View ArticleWhy Apple Should Release iFurnace Powered by iCloud: Another Case for Ambient...
Check out the linked article from popsci.com. It reviews how researchers at Microsoft propose using servers installed in office buildings and apartments as “data furnaces” to keep people warm,...
View ArticleWhat Are the True Dangers of the Cloud?
We often hear that security and privacy concerns are the main inhibitors to cloud adoption. But what are the true threats? Is the cloud really more dangerous than your on-site data center? I would...
View ArticleBeyond Perimeter Defense to Data-Centric Security
Traditionally businesses have focused their IT security on perimeter defense—blocking threats before they enter the network. This protection is still important. But with today’s cloud computing,...
View ArticleFor all your cloud security needs…
Over the past four years, many things have changed in our Cloud Security Blog has been online – largely because of the evolution of the industry. No longer are we encountering “cloud confusion,” as a...
View Article
More Pages to Explore .....