3 Remote Work Security Tips for CISOs

3 Remote Work Security Tips for CISOs

Remote and hybrid work environments are here to stay, which means CISOs need to establish an effective security strategy for managing the expanding attack surface. Organizations can no longer afford (quite literally) to play catch-up with remote work security as ransomware cases and demands continue to rise. Greg Young, Trend Micro’s VP of cybersecurity and Mick McCluney, technical lead for Trend Micro Australia, explore how to create a resilient work from home (WFH) security strategy….

Read More

What is Cloud Native?

What is Cloud Native?

As businesses have moved to the cloud and adopted new cloud services, the architectures and methodologies for building software have had to mature to meet these new demands. According to Gartner, “more than 70 percent of companies have now migrated at least some workloads into the cloud.” We can expect this momentum to continue due to COVID-19, which changed the way businesses operated. The term “cloud native” has grown in popularity, but it has mixed…

Read More

This Week in Security News – January 21, 2022

This Week in Security News – January 21, 2022

Read on: Cybersecurity for Industrial Control Systems: Part 1 In this two-part series, Trend Micro looks at cybersecurity threats that affected industrial control systems endpoints and shares insights and recommendations to mitigate such threats. Trend Micro’s expert team extensively studied reported malware families in ICS endpoints to validate ICS security and establish a global baseline for examining threats that put these systems at risk. CISA Urges US Orgs to Prepare for Data-Wiping Cyberattacks Ukraine government…

Read More

This Week in Security News – January 14, 2022

This Week in Security News – January 21, 2022

Read on: Defending Systems Against Attacks with Layers of Remote Control As organizations brace themselves for the year ahead, now is an opportune time to take stock of how they can strengthen their security posture and shore up their defenses. While organizations may have the power of leading-edge cybersecurity solutions on their side, malicious actors continue to work diligently to refine their methods and take advantage of vulnerabilities every chance they get. Congress To Update…

Read More

Analyzing DevSecOps vs. DevOps

Analyzing DevSecOps vs. DevOps

PEOPLE Many organizations think DevOps is all about tools, but in actuality, strong leadership and culture are vital to its success. Gartner research found that through 2023, 90% of DevOps initiatives will fail due to the limitations of management approaches used by leadership. Shifting to the “assume breach” mindset Seems impossible, right? In his CloudSec 2021 session, Microsoft DevOps Architect Davide Benvegnu, discussed how his engineering team (focusing on Microsoft Azure DevOps) changed their mindset….

Read More

This Week in Security News – January 7, 2022

This Week in Security News – January 21, 2022

Read on: Are Endpoints at Risk for Log4Shell Attacks The end of 2021 saw the emergence of the Log4Shell (CVE-2021-44228) vulnerability, a critical vulnerability in the ubiquitous Java logging package Apache Log4j. Exploiting Log4Shell via crafted log messages can allow an attacker to execute code on remote machines. The potential impact of this vulnerability is great enough that it scores a 10.0 rating based on CVSS version 3.x and a 9.3 rating based on CVSS…

Read More

Organized Cybercrime Cases: What CISOs Need to Know

Organized Cybercrime Cases: What CISOs Need to Know

Organized Cybercrime Cases: What CISOs Need to Know Risk Management Jon Clay, VP of Threat Intelligence at Trend Micro, explores the latest Trend Micro Research covering Access as a Service (AaaS), an emerging business model selling all-access passes to other malicious actors. By: Jon Clay January 07, 2022 Read time:  ( words) What is access as a service? Recently, Trend Micro Research analyzed a new service offering, called Access as a Service (AaaS), in the…

Read More

Top 5 DevOps Resource Center Articles of 2021

Top 5 DevOps Resource Center Articles of 2021

Top 5 DevOps Resource Center Articles of 2021 Cloud Native We look back on the 5 most popular DevOps Resource Center articles in 2021 to help you build at your best in 2022. By: Melanie Tafelski December 29, 2021 Read time:  ( words) 2021 Cloud Security Roundup 2021 was yet again an active year for security and development teams. And as Apache Log4Shell dominates the news, the need for effective, proactive cybersecurity continues to grow….

Read More

Apache Log4j: Mitigating risks

Apache Log4j: Mitigating risks

Apache Log4j: Mitigating risks Risk Management Explore tactical measures and strategic guidance to mitigate ongoing risks caused by Apache Log4j (Log4Shell). By: William Malik December 23, 2021 Read time:  ( words) Apache Log4j (Log4Shell) poses serious challenges for IT teams. In this article, I’ll discuss various tactical measures to navigate the current situation and provide strategic guidance for what to do after the immediate crisis abates. The Problem Log4j is a very useful tool incorporated…

Read More

The Log4j story, and how it has impacted our customers

The Log4j story, and how it has impacted our customers

The security research community had been expecting something like this to come along for a while. So it was with a sense of dread that we read news of a newly discovered CVSS 10.0 vulnerability in early December. The impact is already being felt around the globe as threat actors scramble to exploit the bug before defenders can apply their patches. It is a story that could take months or even years to play out….

Read More
1 12 13 14 15 16