5 reasons to move your endpoint security to the cloud now

As the world has adopts work from home initiatives, we’ve seen many organizations accelerate their plans to move from on-premises endpoint security and Detection and Response (EDR/XDR) solutions to Software as a Service versions. And several customers who switched to the SaaS version last year, recently wrote us to tell how glad to have done…
The post 5 reasons to move your endpoint security to the cloud now appeared first on . Read More HERE…

Read more

Shift Well-Architecture Left. By Extension, Security Will Follow

A story on how Infrastructure as Code can be your ally on Well-Architecting and securing your Cloud environment By Raphael Bottino, Solutions Architect — first posted as a medium article Using Infrastructure as Code(IaC for short) is the norm in the Cloud. CloudFormation, CDK, Terraform, Serverless Framework, ARN… the options are endless! And they are…
The post Shift Well-Architecture Left. By Extension, Security Will Follow appeared first on . Read More HERE…

Read more

What do serverless compute platforms mean for security?

By Kyle Klassen Product Manager – Cloud Native Application Security at Trend Micro Containers provide many great benefits to organizations – they’re lightweight, flexible, add consistency across different environments and scale easily. One of the characteristics of containers is that they run in dedicated namespaces with isolated resource requirements. General purpose OS’s deployed to run…
The post What do serverless compute platforms mean for security? appeared first on . Read More HERE…

Read more

Cloud Native Application Development Enables New Levels of Security Visibility and Control

We are in unique times and it’s important to support each other through unique ways. Snyk is providing a community effort to make a difference through AllTheTalks.online, and Trend Micro is proud to be a sponsor of their virtual fundraiser and tech conference. In today’s threat landscape new cloud technologies can pose a significant risk….
The post Cloud Native Application Development Enables New Levels of Security Visibility and Control appeared first on . Read More HERE…

Read more

Cloud Transformation Is The Biggest Opportunity To Fix Security

This overview builds on the recent report from Trend Micro Research on cloud-specific security gaps, which can be found here. Don’t be cloud-weary. Hear us out. Recently, a major tipping point was reached in the IT world when more than half of new IT spending was on cloud over non- cloud. So rather than being…
The post Cloud Transformation Is The Biggest Opportunity To Fix Security appeared first on . Read More HERE…

Read more

Principles of a Cloud Migration – From Step One to Done

Boiling the ocean with the subject, sous-vide deliciousness with the content. Cloud Migrations are happening every day.  Analysts predict over 75% of mid-large enterprises will migrate a workload to the cloud by 2021 – but how can you make sure your workload is successful? There are not just factors with IT teams, operations, and security,…
The post Principles of a Cloud Migration – From Step One to Done appeared first on . Read More HERE…

Read more

Cloud-First but Not Cloud-Only: Why Organizations Need to Simplify Cybersecurity

The global public cloud services market is on track to grow 17% this year, topping $266 billion. These are impressive figures, and whatever Covid-19 may do short-term to the macro-economy, they’re a sign of where the world is heading. But while many organizations may describe themselves as “cloud-first”, they’re certainly not “cloud-only.” That is, hybrid…
The post Cloud-First but Not Cloud-Only: Why Organizations Need to Simplify Cybersecurity appeared first on . Read More HERE…

Read more

The AWS Service to Focus On – Amazon EC2

If we run a contest for Mr. Popular of Amazon Web Services (AWS), without a doubt Amazon Simple Storage Service (S3) has ‘winner’ written all over it. However, what’s popular is not always what is critical for your business to focus on. There is popularity and then there is dependability. Let’s acknowledge how reliant we…
The post The AWS Service to Focus On – Amazon EC2 appeared first on . Read More HERE…

Read more

Smart Check Validated for New Bottlerocket OS

Containers provide a list of benefits to organizations that use them. They’re light, flexible, add consistency across the environment and operate in isolation. However, security concerns prevent some organizations from employing containers. This is despite containers having an extra layer of security built in – they don’t run directly on the host OS. To make…
The post Smart Check Validated for New Bottlerocket OS appeared first on . Read More HERE…

Read more

Trend Micro Cloud App Security Blocked 12.7 Million High-Risk Email Threats in 2019 – in addition to those detected by cloud email services’ built-in security

On March 3, 2020, the cyber division of Federal Bureau of Investigation (FBI) issued a private industry notification calling out Business Email Compromise (BEC) scams through exploitation of cloud-based email services. Microsoft Office 365 and Google G Suite, the two largest cloud-based email services, are targeted by cyber criminals based on FBI complaint information since…
The post Trend Micro Cloud App Security Blocked 12.7 Million High-Risk Email Threats in 2019 – in addition to those detected by cloud email services’ built-in security appeared first on . Read More HERE…

Read more