Top IT Security Bloggers

Trend Micro - Cloud Security Blog
  • Who is responsible for security in the Ambient Cloud?

    Trend Micro - Cloud Security Blog
    Previous:  Ambient Cloud: What does it mean? We know that the Ambient Cloud is a set of network connected devices that IT departments must manage. But, who is responsible for securing the Ambient Cloud? If you are looking for help from your cloud provider, you might be disappointed. The fact is that you, the enterprise, [...]
  • How to Thwart the Digital Insider: an Advanced Persistent Response to targeted attacks

    Trend Micro - Cloud Security Blog
    One of the oft-repeated themes in media reporting of cyber security events is that the “threat landscape is constantly evolving,” that attacks are becoming increasingly sophisticated and targeted and the men and women behind them are better resourced than ever before. Trend Micro research has found that over 90 percent of enterprise networks contain active, [...]
  • The Ambient Cloud: What does it mean?

    Trend Micro - Cloud Security Blog
    Cloud computing has meant managing servers or virtual machines or software as a service in a data center somewhere. IT executives have come to understand that provisioning on-demand IT software and infrastructure services via the internet provides huge benefits in efficiencies, cost savings and scalability. The rise of mobile devices more powerful than pcs from [...]
  • Why the Silicon Valley Moved East

    Trend Micro - Cloud Security Blog
    Although the recent legislation for the Cybersecurity Act of 2012 did not have enough support in congress to pass, the greater Washington DC area is making a clear statement that it wants to be the next Silicon Valley.  The Federal government, its defense contractors and hardware/software manufactures from around the globe are forming alliances to [...]
  • Software Defined Networking Redefined: VMware Buys Nicira, Oracle Buys Xsigo

    Trend Micro - Cloud Security Blog
    First VMware buys Nicira, then Oracle buys Xsigo. What an exciting couple weeks it’s been. These major acquisitions are completely mucking with the established order of the networking and security industries. It’s about time. Network virtualization has been going on for about 8 years, but it’s been mostly behind the scenes and unless you were [...]
  • What is the New Ambient Cloud and Why?

    Trend Micro - Cloud Security Blog
    Cloud computing has meant managing servers or virtual machines or software as a service in a data center somewhere. The rise of mobile devices more powerful than pcs from a few generations ago, combined with consumerization and the rise of a decentralized workforce has created what we now know as the Ambient Cloud. Ambient Cloud [...]
  • Offense Must Inform Defense: The Importance of Continuous Monitoring

    Trend Micro - Cloud Security Blog
    In light of the introduction yesterday of the seminal Cyber Security Act and the Presidents OP-Ed in the WSJ: Taking the Cyberthreat Seriously. It is time we learn a lesson from those learned by the Federal Government in Cybersecurity. For the last 6 years the United States government has been struggling to determine how nation [...]
  • Virtualization Security Infographic

    Trend Micro - Cloud Security Blog
    The infographic “Looking Beyond the Challenges of Securing Virtual Environments” shows virtualization-specific issues that can introduce threats to the corporate network such as legacy exploits, PoCs (proof-of-concept), and zero-day attacks. Once enterprises slip through security holes, these may potentially damage a brand name/image or worse lead to the loss of company “crown jewels.” From the [...]
  • Four Things That Won’t Bring the Internet Down and Why

    Trend Micro - Cloud Security Blog
    New York Times best-selling author David Eagleman just wrote an awesome piece for CNN called Four Ways the Internet could go down. It is uniquely doomsday-dark, concluding with the idea that we need to build something like a stone monolith with instructions about how to make electricity, computers, and routers. (maybe with Vyatta‘s open source [...]
  • The Evolution of Targeted Attacks in a Web 3.0 World

    Trend Micro - Cloud Security Blog
    Cloud computing, mobile, Advanced Persistent Threats. All are buzz words of the moment in IT and information security circles and yet all are frequently misunderstood and dealt with in silos. It’s become something of a truism to say that the cyber security landscape is constantly morphing. Well, as APTs adapt for the Web 3.0 age, [...]

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release