Cloud security best practices

Credit to Author: Rich Beckett| Date: Wed, 08 Jul 2020 12:30:54 +0000

Analysis of public cloud accounts across Amazon Web Services, Microsoft Azure, and Google Cloud Platform reveals a silver lining when it comes to the protection of cloud data. New research shows that in the last year, 70% of organizations that use public cloud services experienced a security incident. These incidents included attacks from ransomware and [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/DjKfGEHM7x8″ height=”1″ width=”1″ alt=””/>

Read more

Cloud Security Is Simple, Absolutely Simple.

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 08 Jul 2020 13:12:45 +0000

“Cloud security is simple, absolutely simple. Stop over complicating it.” This is how I kicked off a presentation I gave at the CyberRisk Alliance, Cloud Security Summit on Apr 17 of this year. And I truly believe that cloud security is simple, but that does not mean easy. You need the right strategy. As I…

The post Cloud Security Is Simple, Absolutely Simple. appeared first on .

Read more

Beyond the Endpoint: Why Organizations are Choosing XDR for Holistic Detection and Response

Credit to Author: Trend Micro| Date: Mon, 06 Jul 2020 19:52:05 +0000

The endpoint has long been a major focal point for attackers targeting enterprise IT environments. Yet increasingly, security bosses are being forced to protect data across the organization, whether it’s in the cloud, on IoT devices, in email, or on-premises servers. Attackers may jump from one environment to the next in multi-stage attacks and even…

The post Beyond the Endpoint: Why Organizations are Choosing XDR for Holistic Detection and Response appeared first on .

Read more

Survey: Employee Security Training is Essential to Remote Working Success

Credit to Author: Trend Micro| Date: Wed, 01 Jul 2020 11:29:42 +0000

Organisations have been forced to adapt rapidly over the past few months as government lockdowns kept most workers to their homes. For many, the changes they’ve made may even become permanent as more distributed working becomes the norm. This has major implications for cybersecurity. Employees are often described as the weakest link in the corporate…

The post Survey: Employee Security Training is Essential to Remote Working Success appeared first on .

Read more

Risk Decisions in an Imperfect World

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Tue, 30 Jun 2020 12:57:58 +0000

Risk decisions are the foundation of information security. Sadly, they are also one of the most often misunderstood parts of information security. This is bad enough on its own but can sink any effort at education as an organization moves towards a DevOps philosophy. To properly evaluate the risk of an event, two components are…

The post Risk Decisions in an Imperfect World appeared first on .

Read more

Perspectives Summary – What You Said

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Fri, 26 Jun 2020 15:58:07 +0000

  On Thursday, June 25, Trend Micro hosted our Perspectives 2-hour virtual event. As the session progressed, we asked our attendees, composed of +5000 global registrants, two key questions. This blog analyzes those answers.   First, what is your current strategy for securing the cloud? Rely completely on native cloud platform security capabilities (AWS, Azure,…

The post Perspectives Summary – What You Said appeared first on .

Read more

Principles of a Cloud Migration

Credit to Author: Jason Dablow| Date: Fri, 26 Jun 2020 15:33:52 +0000

cloud

Development and application teams can be the initial entry point of a cloud migration as they start looking at faster ways to accelerate value delivery. One of the main things they might use during this is “Infrastructure as Code,” where they are creating cloud resources for running their applications using lines of code. In the…

The post Principles of a Cloud Migration appeared first on .

Read more