What Worries CISOs Most
From acquisitions to GDPR compliance, we interviewed a group of CISOs and IT security leaders to find out just what’s been keeping you and your peers up at night. Read More HERE…
From acquisitions to GDPR compliance, we interviewed a group of CISOs and IT security leaders to find out just what’s been keeping you and your peers up at night. Read More HERE…
Over the past three decades, we’ve had time at Trend Micro to observe the industry trends that have the biggest impact on our customers. And one of the big things we’ve seen is that threats move largely in tandem with changes to IT infrastructure. This matters today because most organizations are transforming the way they…
The post Why CISOs Are Demanding Detection and Response Everywhere appeared first on . Read More HERE…
A story on how Infrastructure as Code can be your ally on Well-Architecting and securing your Cloud environment By Raphael Bottino, Solutions Architect — first posted as a medium article Using Infrastructure as Code(IaC for short) is the norm in the Cloud. CloudFormation, CDK, Terraform, Serverless Framework, ARN… the options are endless! And they are…
The post Shift Well-Architecture Left. By Extension, Security Will Follow appeared first on . Read More HERE…
Dear Customers, Together, we are facing a truly unprecedented situation and we have all had to adapt to the new reality. The global coronavirus pandemic is affecting our families, our communities, our organizations – indeed, it affects our perspective and way of life. As you certainly have too, at Trend Micro we have been busy…
The post Letter from the CEO: A time of kindness and compassion appeared first on . Read More HERE…
By Kyle Klassen Product Manager – Cloud Native Application Security at Trend Micro Containers provide many great benefits to organizations – they’re lightweight, flexible, add consistency across different environments and scale easily. One of the characteristics of containers is that they run in dedicated namespaces with isolated resource requirements. General purpose OS’s deployed to run…
The post What do serverless compute platforms mean for security? appeared first on . Read More HERE…
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about why Zoom has released an update for its Linux, Mac, and Windows apps that removes the meeting ID from the app’s title bar. Also, read…
The post This Week in Security News: Exploring Common Threats to Cloud Security and Zoom Removes Meeting IDs from App Title Bar to Improve Privacy appeared first on . Read More HERE…
We are in unique times and it’s important to support each other through unique ways. Snyk is providing a community effort to make a difference through AllTheTalks.online, and Trend Micro is proud to be a sponsor of their virtual fundraiser and tech conference. In today’s threat landscape new cloud technologies can pose a significant risk….
The post Cloud Native Application Development Enables New Levels of Security Visibility and Control appeared first on . Read More HERE…
This overview builds on the recent report from Trend Micro Research on cloud-specific security gaps, which can be found here. Don’t be cloud-weary. Hear us out. Recently, a major tipping point was reached in the IT world when more than half of new IT spending was on cloud over non- cloud. So rather than being…
The post Cloud Transformation Is The Biggest Opportunity To Fix Security appeared first on . Read More HERE…
Boiling the ocean with the subject, sous-vide deliciousness with the content. Cloud Migrations are happening every day. Analysts predict over 75% of mid-large enterprises will migrate a workload to the cloud by 2021 – but how can you make sure your workload is successful? There are not just factors with IT teams, operations, and security,…
The post Principles of a Cloud Migration – From Step One to Done appeared first on . Read More HERE…
Working from home? How do you keep your employees cyber-safe and cyber-secure? How do you protect your reputation, profit, and cash flow when you depend on your IT infrastructure as never before? The National Cyber Security Alliance is hosting a series of webinars for small business owners, and we’re proud to support this effort with…
The post NCSA Small Business Webinar Series appeared first on . Read More HERE…