Top IT Security Bloggers

Trend Micro - Cloud Security Blog
  • Security On Azure

    Trend Micro - Cloud Security Blog
    With any public cloud, security is a shared responsibility between the cloud service provider and you, the user of those services. For IaaS offerings, this usually means the division of responsibilities is as follows:   Cloud Service Provider You Facilities Physical security Network infrastructure Virtualization layer Operating system Applications Data   If you’ve done work...
  • Getting Up to Speed on Azure

    Trend Micro - Cloud Security Blog
    Microsoft recently held their annual Build conference. The premier developer event for Microsoft is usually quite predictable. You could safely expect a few incremental improvements in various technologies and fantastic developer sessions on current tech. See for yourself; the sessions are online from 2012 and 2013. Things were different this year. I’ll be addressing the...
  • Optimizing Security for AWS

    Trend Micro - Cloud Security Blog
    I recently hosted a webinar on optimizing security for AWS. The goal of the webinar was to help raise awareness of how security changes as you move to the AWS Cloud. I strongly believe that if you’re aware of the changes, you can actually build a stronger security posture for your deployments. The webinar runs...
  • Tools You Can Use to Protect Yourself from Heartbleed

    Trend Micro - Cloud Security Blog
    Last week, we said that the best things you can do to help protect yourself from the Heartbleed vulnerability were to make sure you’re running a security suite like Titanium, keep an eye on your accounts for unusual activity, and change your passwords when you’re told to by website operators. Today, we want to let...
  • Your Source for all Things Heartbleed

    Trend Micro - Cloud Security Blog
    Here you will find the latest blogs from Trend Micro’s experts along with a comprehensive look at how the media has covered this vulnerability. We encourage you to scroll through the various blogs, provide comments and enjoy the in-depth knowledge that Trend Micro has to offer.   April 16, 2014 Yahoo Small business Advisor Not...
  • FakeAV in Google Play and how Trend Micro Mobile App Reputation Services Dynamic Analysis Helps Protect You

    Trend Micro - Cloud Security Blog
    Only 4 months into 2014 and the Android malware problem continues to explode. Android malware and high risk apps have already reached the 2 million mark, putting us well on our way to our CTO’s prediction of 3 million pieces of malware and high risk apps (Diagram 1). In fact, in the first 3 months...
  • Trend Micro takes integrated protection to the next level with Complete User Protection solution refresh

    Trend Micro - Cloud Security Blog
    Trend Micro has spent the past 25 years protecting its customers from the latest threats. Over that time, those threats, and the people behind them, have changed almost beyond recognition. Businesses have never before faced attacks on such a broad array of devices and applications as they do today, so we’ve got to keep improving....
  • Heartbleed Impacting the Deep Web?

    Trend Micro - Cloud Security Blog
    News of this week’s massive and far reaching OpenSSL vulnerability “Heartbleed” has put all of us on our heels. In what I would call the equivalent of an Internet oil spill, individuals and organizations are scrambling to discover how to clean up this mess and get on with business as usual. This will not be...
  • Heartbleed – One Week In

    Trend Micro - Cloud Security Blog
    Heartbleed just got real. The bug has been dominating headlines for the past week – and rightfully so. The scale of the impact of this issue is major. OpenSSL has been integrated into a significant number of development projects. It’s probably the most commonly used security library out there. Late Friday night (the 11th of...
  • Targeted Attacks and Advanced Threats: Why Senior Executives Need Your Help

    Trend Micro - Cloud Security Blog
    A recent online survey asked Harvard Business Review (HBR) readers at organizations with more than 500 employees to share their perspectives regarding the level of concern, budget and impacts of targeted attacks and advanced threats. In a webinar presentation on April 16, 2014 at 12:00 p.m. Eastern, Scott J. Shackelford, JD, PhD, Assistant Professor of...
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Cloud Security and Compliance Solutions

Manage and visualize the security and compliance of VMware, physical, and hybrid-cloud infrastructure from the RSA Archer eGRC Platform.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).

  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.