Trend Micro - Cloud Security BlogIf you still believe that your systems management consoles should be running on servers in your data center, you’re definitely from the pre-cloud era. Even if you believe your systems management and security consoles should be running on infrastructure as a service instances you control, you’re also out of date. The evidence is in, and [...]
Trend Micro - Cloud Security BlogOver the past weeks we have been reviewing the top 10 tips for securing instances running on Amazon Web Services. We walked through the critical controls as part of the AWS shared security model. As noted in these tips, host-based security capabilities such as intrusion detection and prevention, anti-malware, and integrity monitoring are critical for [...]
Trend Micro - Cloud Security BlogAmazon Web Services did it again. Its new service, OpsWorks, is an application management service with the ability to manage applications of any scale or complexity in the AWS cloud. This integrated system manages resource provisioning, configuration management, application deployment, software updates, and monitoring and access control. The service is another offering from the leader in [...]
Trend Micro - Cloud Security BlogIn last week’s post, we gave a high level overview of vulnerability assessments. This type of assessment results in a prioritized list of vulnerabilities in your deployment. It’s an excellent first step in knowing the state of your deployment. The next step you should take is to conduct a penetration test. The Test A penetration [...]
Trend Micro - Cloud Security BlogAs a Product Marketing Manager for Trend Micro™ Worry-Free™ Business Security Services, I hear a lot of objections about the product, and in particular, a lot of cloud-related fears. Some examples of things I hear from customers and partners are: “I wouldn’t be secure if my Internet connection went down.” “I don’t want to put [...]
Trend Micro - Cloud Security BlogIn this series, Mark and I have talked about hardening your AWS resources (both inside and outside of your instances) and preforming ongoing monitoring. The last two tips are around measuring your overall security so that you can understand your risks and measure your progress. It may be an old adage but it still rings true… [...]
Trend Micro - Cloud Security BlogRemote management module (RMM) vendors frequently offer an integrated security solution with their core product. But how does the security featured in these integrated products compare? In a previous blog, I wrote about the five questions to ask your RMM vendor about integrated security offerings. Now, here are five more questions to make sure you [...]
Trend Micro - Cloud Security Blog“Software defined” is the latest buzzword in IT and cloud. Some people hate it because marketers are jumping on ”software defined” almost as fast as they jumped on the word “cloud” years before they had real cloud products. Cloudwashing was a real phenomenon, and it was easy to say. “Software Defined Washing” just doesn’t roll [...]
Trend Micro - Cloud Security BlogLast week, we tackled the basics of monitoring your AWS deployment. This week we’re going to shift gears and take a look at encryption. Data Drives Your Business Your business runs on data and information. One of the biggest concerns about moving to the public cloud is the safety of that data. With a little due [...]
Trend Micro - Cloud Security BlogRemote management and monitoring (RMM) vendors often offer an integrated security solution with their core product. But how does the security offered by these integrated options compare? Below are the questions to ask your RMM vendor to make sure you get the full picture of the security being offered. 1. Is the security solution included [...]
Sign up now »
File MPS analyzes network file shares to detect and quarantine malware brought into the network through the Web, email, or other manual means, such as online file sharing.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.