Trend Micro - Cloud Security BlogWith any public cloud, security is a shared responsibility between the cloud service provider and you, the user of those services. For IaaS offerings, this usually means the division of responsibilities is as follows: Cloud Service Provider You Facilities Physical security Network infrastructure Virtualization layer Operating system Applications Data If you’ve done work...
Trend Micro - Cloud Security BlogMicrosoft recently held their annual Build conference. The premier developer event for Microsoft is usually quite predictable. You could safely expect a few incremental improvements in various technologies and fantastic developer sessions on current tech. See for yourself; the sessions are online from 2012 and 2013. Things were different this year. I’ll be addressing the...
Trend Micro - Cloud Security BlogI recently hosted a webinar on optimizing security for AWS. The goal of the webinar was to help raise awareness of how security changes as you move to the AWS Cloud. I strongly believe that if you’re aware of the changes, you can actually build a stronger security posture for your deployments. The webinar runs...
Trend Micro - Cloud Security BlogLast week, we said that the best things you can do to help protect yourself from the Heartbleed vulnerability were to make sure you’re running a security suite like Titanium, keep an eye on your accounts for unusual activity, and change your passwords when you’re told to by website operators. Today, we want to let...
Trend Micro - Cloud Security BlogHere you will find the latest blogs from Trend Micro’s experts along with a comprehensive look at how the media has covered this vulnerability. We encourage you to scroll through the various blogs, provide comments and enjoy the in-depth knowledge that Trend Micro has to offer. April 16, 2014 Yahoo Small business Advisor Not...
FakeAV in Google Play and how Trend Micro Mobile App Reputation Services Dynamic Analysis Helps Protect YouTrend Micro - Cloud Security BlogOnly 4 months into 2014 and the Android malware problem continues to explode. Android malware and high risk apps have already reached the 2 million mark, putting us well on our way to our CTO’s prediction of 3 million pieces of malware and high risk apps (Diagram 1). In fact, in the first 3 months...
Trend Micro takes integrated protection to the next level with Complete User Protection solution refreshTrend Micro - Cloud Security BlogTrend Micro has spent the past 25 years protecting its customers from the latest threats. Over that time, those threats, and the people behind them, have changed almost beyond recognition. Businesses have never before faced attacks on such a broad array of devices and applications as they do today, so we’ve got to keep improving....
Trend Micro - Cloud Security BlogNews of this week’s massive and far reaching OpenSSL vulnerability “Heartbleed” has put all of us on our heels. In what I would call the equivalent of an Internet oil spill, individuals and organizations are scrambling to discover how to clean up this mess and get on with business as usual. This will not be...
Trend Micro - Cloud Security BlogHeartbleed just got real. The bug has been dominating headlines for the past week – and rightfully so. The scale of the impact of this issue is major. OpenSSL has been integrated into a significant number of development projects. It’s probably the most commonly used security library out there. Late Friday night (the 11th of...
Trend Micro - Cloud Security BlogA recent online survey asked Harvard Business Review (HBR) readers at organizations with more than 500 employees to share their perspectives regarding the level of concern, budget and impacts of targeted attacks and advanced threats. In a webinar presentation on April 16, 2014 at 12:00 p.m. Eastern, Scott J. Shackelford, JD, PhD, Assistant Professor of...
Sign up now »
Manage and visualize the security and compliance of VMware, physical, and hybrid-cloud infrastructure from the RSA Archer eGRC Platform.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.