Connected Security Solutions Helps City of Tyler’s CIO to Reduce Costs While Enabling Delivery of Enhanced Community & Public Safety Services

“We’re here to serve” is Benny Yazdanpanahi’s motto as CIO for City of Tyler located in Texas. Supporting a population of approximately 107,000, Yazdanpanahi’s vision for his city relies on the use of data to deliver exceptional services to citizens, today and into the future.   Since joining the city nearly 19 years ago, Yazdanpanahi…
The post Connected Security Solutions Helps City of Tyler’s CIO to Reduce Costs While Enabling Delivery of Enhanced Community & Public Safety Services appeared first on . Read More HERE…

Read more

Risk Decisions in an Imperfect World

Risk decisions are the foundation of information security. Sadly, they are also one of the most often misunderstood parts of information security. This is bad enough on its own but can sink any effort at education as an organization moves towards a DevOps philosophy. To properly evaluate the risk of an event, two components are…
The post Risk Decisions in an Imperfect World appeared first on . Read More HERE…

Read more

Principles of a Cloud Migration

Development and application teams can be the initial entry point of a cloud migration as they start looking at faster ways to accelerate value delivery. One of the main things they might use during this is “Infrastructure as Code,” where they are creating cloud resources for running their applications using lines of code. In the…
The post Principles of a Cloud Migration appeared first on . Read More HERE…

Read more

Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations

  Trend Micro is excited to launch new Trend Micro Cloud One™ – Conformity capabilities that will strengthen protection for Azure resources.   As with any launch, there is a lot of new information, so we decided to sit down with one of the founders of Conformity, Mike Rahmati. Mike is a technologist at heart,…
The post Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations appeared first on . Read More HERE…

Read more

The Fear of Vendor Lock-in Leads to Cloud Failures

  Vendor lock-in has been an often-quoted risk since the mid-1990’s. Fear that by investing too much with one vendor, an organization reduces their options in the future. Was this a valid concern? Is it still today?   The Risk Organizations walk a fine line with their technology vendors. Ideally, you select a set of…
The post The Fear of Vendor Lock-in Leads to Cloud Failures appeared first on . Read More HERE…

Read more

Principles of a Cloud Migration – Security W5H – The HOW

“How about… ya!” Security needs to be treated much like DevOps in evolving organizations; everyone in the company has a responsibility to make sure it is implemented. It is not just a part of operations, but a cultural shift in doing things right the first time – Security by default. Here are a few pointers…
The post Principles of a Cloud Migration – Security W5H – The HOW appeared first on . Read More HERE…

Read more

Principles of a Cloud Migration – Security W5H – The WHERE

“Wherever I go, there I am” -Security I recently had a discussion with a large organization that had a few workloads in multiple clouds while assembling a cloud security focused team to build out their security policy moving forward.  It’s one of my favorite conversations to have since I’m not just talking about Trend Micro…
The post Principles of a Cloud Migration – Security W5H – The WHERE appeared first on . Read More HERE…

Read more

Principles of a Cloud Migration – Security W5H – The When

If you have to ask yourself when to implement security, you probably need a time machine! Security is as important to your migration as the actual workload you are moving to the cloud. Read that again. It is essential to be planning and integrating security at every single layer of both architecture and implementation. What…
The post Principles of a Cloud Migration – Security W5H – The When appeared first on . Read More HERE…

Read more

Shift Well-Architecture Left. By Extension, Security Will Follow

A story on how Infrastructure as Code can be your ally on Well-Architecting and securing your Cloud environment By Raphael Bottino, Solutions Architect — first posted as a medium article Using Infrastructure as Code(IaC for short) is the norm in the Cloud. CloudFormation, CDK, Terraform, Serverless Framework, ARN… the options are endless! And they are…
The post Shift Well-Architecture Left. By Extension, Security Will Follow appeared first on . Read More HERE…

Read more