Five steps to avoid a cloud data breach

Credit to Author: Sally Adam| Date: Fri, 21 Feb 2020 11:59:35 +0000

The recent MGM Resort hotels cloud server data breach highlights the need to secure sensitive data held in the public cloud.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/ifst-NkTXmQ” height=”1″ width=”1″ alt=””/>

Read more

Four Reasons Your Cloud Security Is Keeping You Up At Night

Credit to Author: Trend Micro| Date: Tue, 04 Feb 2020 13:01:47 +0000

We are excited to introduce guest posts from our newest Trenders from Cloud Conformity, now Trend Micro Cloud One – Conformity. More insights will be shared from this talented team to help you be confident and in control of the security of your cloud environments! Why your cloud security is keeping you up at night…

The post Four Reasons Your Cloud Security Is Keeping You Up At Night appeared first on .

Read more

How To Get The Most Out Of Industry Analyst Reports

Credit to Author: Trend Micro| Date: Fri, 13 Dec 2019 17:26:20 +0000

Whether you’re trying to inform purchasing decisions or just want to better understand the cybersecurity market and its players, industry analyst reports can be very helpful. Following our recent accolades by Forrester and IDC in their respective cloud security reports, we want to help customers understand how to use this information. Our VP of cybersecurity,…

The post How To Get The Most Out Of Industry Analyst Reports appeared first on .

Read more

Network security simplified with Amazon VPC Ingress Routing and Trend Micro

Credit to Author: Trend Micro| Date: Tue, 03 Dec 2019 08:35:39 +0000

Today, Amazon Web Services (AWS) announced the availability of a powerful new service, Amazon Virtual Private Cloud (Amazon VPC) Ingress Routing. As a Launch Partner for Amazon VPC Ingress Routing, we at Trend Micro are proud to continue to innovate alongside AWS to provide solutions to customers—enabling new approaches to network security. Trend Micro™ TippingPoint™…

The post Network security simplified with Amazon VPC Ingress Routing and Trend Micro appeared first on .

Read more

Trend Micro launches Trend Micro Cloud One™, a leading security services platform for cloud builders

Credit to Author: Trend Micro| Date: Mon, 18 Nov 2019 15:45:42 +0000

Everything you need for cloud security   Today, Trend Micro is excited to announce the launch of Trend Micro Cloud One™, our new security services platform for cloud builders. This powerful new platform will help our customers simplify their hybrid and multi-cloud security.   Cloud One gives you the total package for cloud security. Comprised…

The post Trend Micro launches Trend Micro Cloud One™, a leading security services platform for cloud builders appeared first on .

Read more

What you need to know about new data-security rules for business travel

Credit to Author: Mike Elgan| Date: Fri, 15 Nov 2019 07:39:00 -0800

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

Read more

Microsoft Intune can now block unauthorized BYOD hardware

Credit to Author: Lucas Mearian| Date: Tue, 05 Nov 2019 12:24:00 -0800

Microsoft has integrated third-party mobile threat defense (MTD) software with its Intune unified endpoint management (UEM) platform, enabling corporate systems to detect when an employee’s unenrolled, smartphone or tablet has an app potentially infected by malware.

The new Intune capability is particularly useful for companies with bring-your-own device (BYOD) policies in that it can block access to enterprise systems on devices flagged by the MTD software.

The mobile threat detection feature on Intune will initially allow it to work with software from Lookout for Work, Better Mobile and Zimperium. “In future, we expect other partners to add support for this integration,” Microsoft said via a Monday blog post released during its Ignite conference.

To read this article in full, please click here

Read more