Corporate Partners

Top IT Security Bloggers

Trend Micro - Cloud Security Blog
  • Cloud Security: Shared Responsibility in Action

    Trend Micro - Cloud Security Blog
    Security in the cloud is a shared responsibility. I’ve written about this before, but with AWS re:Invent right around the corner, now is a good time to explore this idea further and see what the model looks like when applied in production. The Model Before we dive in, let’s make sure we’re all working with...
  • Keep Your Business’s Data Safe in the Cloud

    Trend Micro - Cloud Security Blog
    In the days before cloud was an enterprise thing, back when systems, networks and perimeters were much more clearly defined, information security teams of course still had concerns to address and data to secure. One of the emerging risks in the mid-nineties earned the name of “Shadow IT.” And it’s still with us today. Shadow...
  • Think Before you “Share” to Prevent Identity Theft

    Trend Micro - Cloud Security Blog
    You wouldn’t broadcast your credit card information in the middle of the street, so why would you share other private information publicly on your social media page? The truth is, many people don’t realize how their privacy settings work on social profiles, and because of this many people unintentionally share personal information with the world....
  • Sandworm and SCADA

    Trend Micro - Cloud Security Blog
    On the heels of the news that the “sandworm” vulnerability (CVE-2014-4114) was being used in attacks against the North Atlantic Treaty Organization (NATO) and several European industries and sectors, Trend Micro’s researchers Kyle Wilhoit and Jim Gogolinski and the rest of the Trend Micro FTR team have discovered new, worrying attacks utilizing this vulnerability. Our...
  • Phishing schemes: Don’t take the bait!

    Trend Micro - Cloud Security Blog
    Would you give your bank account information to a professional-looking stranger who stops you on the street? The obvious answer is no, but thousands of people do it every day—except through email and convincing banner advertisements. It’s called phishing, and it’s an identity thief’s top way to access your personal information. For example, you receive...
  • The Security of Everything

    Trend Micro - Cloud Security Blog
                  The Internet is a living thing; initially conceived upon an architecture able to withstand and rebuild following significant outages, it has taken on a life of its own, giving rise to “The Web,” to Web 2.0, globe-spanning social networks connecting and inspiring people in ways unimagined even 10...
  • Is iWorm a Wake-Up Call for Mac Security?

    Trend Micro - Cloud Security Blog
    With various publications reporting tens of thousands of users affected around the world by iWorm, does your organization have a good Mac security plan? When iWorm has infected a Mac computer, the malware makes a connection with a command and control (C & C) server out on the Internet. This connection with the C &...
  • Protecting Your Privacy – A Key to Online Security

    Trend Micro - Cloud Security Blog
    Let’s face it, folks. Maintaining your online privacy is really hard to do today. Even though it’s difficult, you should try to keep as much of your personal stuff under wraps as possible. There is a new identity fraud victim in the U.S. every three seconds.  Identity thieves don’t just look through your garbage for old...
  • Chicken or the Egg? Secure App Development

    Trend Micro - Cloud Security Blog
                    The year 2013 was labeled the “year of the breach.” I guess we were horribly wrong.  So far in 2014, we have seen nearly 600 breaches logged in the U.S. alone.  This is a global issue that needs more investment and visibility.  The recent disclosure of JP...
  • Securing Your SharePoint Deployment on Azure

    Trend Micro - Cloud Security Blog
    Moving Windows workloads, particularly SharePoint, onto Azure, is one of the most important Microsoft Cloud strategies.  More and more customers and partners have started to evaluate Microsoft Azure as their extended data center to run SharePoint services.                 SharePoint has evolved a great deal in the last decade,...

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place