The Shared Responsibility Model

I’m often asked what the biggest cyberthreats are in the cloud. When people pose that question, they seem to be expecting an answer on par with a Hollywood movie plot. The truth is far simpler. The number one threat in the cloud today is service misconfigurations. Despite the cloud’s clear operating model, teams continue to…
The post The Shared Responsibility Model appeared first on . Read More HERE…

Read more

Trend Micro Acquires Cloud Conformity

Developers who are responsible for managing their business’s IT infrastructure day-to-day often have to work with the technology providers they’re given. Our goal is to make sure our security solutions work for developers, providing seamless, automated security, rather than a roadblock to work around so you can do your job. Today’s acquisition of Cloud Conformity…
The post Trend Micro Acquires Cloud Conformity appeared first on . Read More HERE…

Read more

Beyond The Standard CISO Cloud Security Guide

Verizon recently released a 5 step process for evaluating cloud security products and services to inform purchase decisions. That’s a fantastic tool for buyers to have. This is especially helpful because cloud discussions are almost always driven by business objectives to satisfy a cost and or productivity problem. The CISO has to come in and…
The post Beyond The Standard CISO Cloud Security Guide appeared first on . Read More HERE…

Read more

New Azure Marketplace Pay-As-You-Go Billing for Trend Micro Deep Security as a Service

Cloud adoption continues to rise as organizations reduce their data center footprint, look to cloud native technologies to improve their application design and output, and strive to improve scalability and management of resources and systems. In a recent survey conducted by analyst firm ESG, 87% of respondents indicated that they currently run production applications and…
The post New Azure Marketplace Pay-As-You-Go Billing for Trend Micro Deep Security as a Service appeared first on . Read More HERE…

Read more

Migrating Network Protection to the Cloud with Confidence

For modern organizations, speed and agility is the key to success – built on enhanced IT efficiency and performance driven by the cloud. Anything less could see your business outpaced by the competition. As always, security must be a priority when migrating to the cloud, but network teams are being let down by existing tools….
The post Migrating Network Protection to the Cloud with Confidence appeared first on . Read More HERE…

Read more

AWS re:Inforce 2019 re:Cap

The inaugural AWS Cloud security conference—AWS re:Inforce—was held in Boston this week. Well over 8,000 attendees descended on the Boston Convention and Exhibition Center for two days jammed packed with security education and cloud content. This was a very interesting conference because the dynamics of the attendees felt very different from typical AWS events. Usually…
The post AWS re:Inforce 2019 re:Cap appeared first on . Read More HERE…

Read more

The Next Enterprise Challenge: How Best to Secure Containers and Monolithic Apps Together, Company-wide

Submitted by: Adam Boyle, Head of Product Management, Hybrid Cloud Security, Trend Micro When it comes to software container security, it’s important for enterprises to look at the big picture, taking into account how they see containers effecting their larger security requirements and future DevOps needs. Good practices can help security teams build a strategy that…
The post The Next Enterprise Challenge: How Best to Secure Containers and Monolithic Apps Together, Company-wide appeared first on . Read More HERE…

Read more

Does your cloud-access security broker support IPv6? It should.

Cloud access security brokers (CASB) insert security between enterprises and their cloud services by providing visibility and access control, but IPv6 could be causing a dangerous blind spot.That’s because CASBs might not support IPv6, which could be in wide corporate use even in enterprises that choose IPv4 as their preferred protocol. [ Related: What is IPv6, and why aren’t we there yet?
For example, end users working remotely have a far greater chance of connecting via IPv6 than when they are in the office.  Mobile providers collectively have a high percentage of IPv6-connected subscribers and broadband residential Internet customers often have IPv6 connectivity without realizing it.  Internet service providers and software-as-a-service (SaaS) vendors both widely support IPv6, so a mobile worker accessing, say, DropBox over a Verizon 4G wireless service might very well connect via IPv6.To read this article in full, please click here(Insider Story) READ MORE HERE…

Read more

How blockchain will manage networks

Ethernet networking technology is flawed, say some engineers. The problem is it doesn’t have any inherent security built in to it. Ethernet also hard to manage because it’s centralized. It’s out-of-date, and it needs revamping, researchers say.One attempt to address the issue is the Marconi protocol, which is a strategy to shift network and packet management over to a smart contract, decentralized chain-based system. Smart contracts are trackable, verifiable transactions. They’re performed through encrypted blockchains and are self-enforcing.To read this article in full, please click here READ MORE HERE…

Read more

AWS Security Hub and Deep Security

One of the biggest challenges in maintaining your security posture is visibility. You have security controls deployed throughout the stack, and each fo these tools is generating its own set of data points and has its own view of your deployment. Managing the multitude of alerts and events from these tools can quickly get overwhelming….
The post AWS Security Hub and Deep Security appeared first on . Read More HERE…

Read more