How To Get The Most Out Of Industry Analyst Reports

Credit to Author: Trend Micro| Date: Fri, 13 Dec 2019 17:26:20 +0000

Whether you’re trying to inform purchasing decisions or just want to better understand the cybersecurity market and its players, industry analyst reports can be very helpful. Following our recent accolades by Forrester and IDC in their respective cloud security reports, we want to help customers understand how to use this information. Our VP of cybersecurity,…

The post How To Get The Most Out Of Industry Analyst Reports appeared first on .

Read more

Network security simplified with Amazon VPC Ingress Routing and Trend Micro

Credit to Author: Trend Micro| Date: Tue, 03 Dec 2019 08:35:39 +0000

Today, Amazon Web Services (AWS) announced the availability of a powerful new service, Amazon Virtual Private Cloud (Amazon VPC) Ingress Routing. As a Launch Partner for Amazon VPC Ingress Routing, we at Trend Micro are proud to continue to innovate alongside AWS to provide solutions to customers—enabling new approaches to network security. Trend Micro™ TippingPoint™…

The post Network security simplified with Amazon VPC Ingress Routing and Trend Micro appeared first on .

Read more

Trend Micro launches Trend Micro Cloud One™, a leading security services platform for cloud builders

Credit to Author: Trend Micro| Date: Mon, 18 Nov 2019 15:45:42 +0000

Everything you need for cloud security   Today, Trend Micro is excited to announce the launch of Trend Micro Cloud One™, our new security services platform for cloud builders. This powerful new platform will help our customers simplify their hybrid and multi-cloud security.   Cloud One gives you the total package for cloud security. Comprised…

The post Trend Micro launches Trend Micro Cloud One™, a leading security services platform for cloud builders appeared first on .

Read more

What you need to know about new data-security rules for business travel

Credit to Author: Mike Elgan| Date: Fri, 15 Nov 2019 07:39:00 -0800

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

Read more

Microsoft Intune can now block unauthorized BYOD hardware

Credit to Author: Lucas Mearian| Date: Tue, 05 Nov 2019 12:24:00 -0800

Microsoft has integrated third-party mobile threat defense (MTD) software with its Intune unified endpoint management (UEM) platform, enabling corporate systems to detect when an employee’s unenrolled, smartphone or tablet has an app potentially infected by malware.

The new Intune capability is particularly useful for companies with bring-your-own device (BYOD) policies in that it can block access to enterprise systems on devices flagged by the MTD software.

The mobile threat detection feature on Intune will initially allow it to work with software from Lookout for Work, Better Mobile and Zimperium. “In future, we expect other partners to add support for this integration,” Microsoft said via a Monday blog post released during its Ignite conference.

To read this article in full, please click here

Read more

SophosLabs surveys the threat landscape for 2020 trends

Credit to Author: Andrew Brandt| Date: Tue, 05 Nov 2019 13:50:31 +0000

SophosLabs this morning published its annual assessment on the state of internet and information security, and our outlook on what security threats are likely to affect the world in the coming year: the SophosLabs 2020 Threat Report, available for download now. This year, our report broadens the scope of our analysis to cover topics beyond [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/tFcwsfiM20g” height=”1″ width=”1″ alt=””/>

Read more

Storing your stuff securely in the cloud

Credit to Author: Maria Varmazis| Date: Tue, 22 Oct 2019 14:24:10 +0000

How much of our stuff is going to the cloud? Probably a lot more than you realize. Let’s look at the risks and how to mitigate them.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/27shf2RZHS8″ height=”1″ width=”1″ alt=””/>

Read more

The Shared Responsibility Model

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Tue, 22 Oct 2019 13:05:29 +0000

Hands in for support/sharinga

I’m often asked what the biggest cyberthreats are in the cloud. When people pose that question, they seem to be expecting an answer on par with a Hollywood movie plot. The truth is far simpler. The number one threat in the cloud today is service misconfigurations. Despite the cloud’s clear operating model, teams continue to…

The post The Shared Responsibility Model appeared first on .

Read more

Trend Micro Acquires Cloud Conformity

Credit to Author: Trend Micro| Date: Mon, 21 Oct 2019 12:31:14 +0000

Developers who are responsible for managing their business’s IT infrastructure day-to-day often have to work with the technology providers they’re given. Our goal is to make sure our security solutions work for developers, providing seamless, automated security, rather than a roadblock to work around so you can do your job. Today’s acquisition of Cloud Conformity…

The post Trend Micro Acquires Cloud Conformity appeared first on .

Read more

Beyond The Standard CISO Cloud Security Guide

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Thu, 19 Sep 2019 13:53:11 +0000

Verizon recently released a 5 step process for evaluating cloud security products and services to inform purchase decisions. That’s a fantastic tool for buyers to have. This is especially helpful because cloud discussions are almost always driven by business objectives to satisfy a cost and or productivity problem. The CISO has to come in and…

The post Beyond The Standard CISO Cloud Security Guide appeared first on .

Read more