Top IT Security Bloggers

Trend Micro - Cloud Security Blog
  • Everything You Need to Know About Windows 8 in 8 Minutes – Except Security

    Trend Micro - Cloud Security Blog
    Check out this video about Windows 8. It isn’t cloud security specific, but it’s got a ton of info about how Windows 8 will interact with the cloud, and it’s just8 minutes. Very worth seeing if you’re not up to speed on Windows 8. Windows 8 is going to have “built in” cloud services that [...]
  • Encrypting Amazon Storage: Not So Simple

    Trend Micro - Cloud Security Blog
    At my Interop presentation last week, a few people asked me about how secure storage on Amazon AWS can be. Here’s my take. First off, you’d have to say which type of storage you’re thinking of using before you figure out how secure you can make it. There are 3 different kinds of storage within [...]
  • Beyond Perimeter Defense to Data-Centric Security

    Trend Micro - Cloud Security Blog
    Traditionally businesses have focused their IT security on perimeter defense—blocking threats before they enter the network. This protection is still important.  But with today’s cloud computing, mobile devices, and advanced persistent threats (APTs), businesses need security that protects their data wherever it travels and in whatever type of device it resides, requiring new data-centric security.  [...]
  • Join the Journey to the Cloud on Oct/5

    Trend Micro - Cloud Security Blog
    Live in 10 Cities + Broadcast live Online. Trend Micro and VMware invite you—along with other selected enterprise leaders—to join leading cloud and virtualization security experts for this exclusive live event that will provide a clear picture of what it takes to truly secure your cloud environments. The Most Important Cloud Event of 2011: 10 [...]
  • What Are the True Dangers of the Cloud?

    Trend Micro - Cloud Security Blog
    We often hear that security and privacy concerns are the main inhibitors to cloud adoption.  But what are the true threats?  Is the cloud really more dangerous than your on-site data center?  I would say that virtualization and cloud computing aren’t inherently more dangerous, but they have unique infrastructure that must be addressed when creating [...]
  • Encryption is Not Enough for Cloud Security

    Trend Micro - Cloud Security Blog
    By saying that encryption is not enough for cloud security, I don’t mean that you also need other types of protection like server security, identity management, etc.  I think most people deploying cloud computing plan to implement more than encryption for security.  What I mean is that encryption alone is not enough in an encryption [...]
  • Why is VMware Downplaying their PacketMotion Acquisition?

    Trend Micro - Cloud Security Blog
    This week, on a Friday before the start of VMworld, VMware announced that they acquired PacketMotion. It was announced in a blog post Friday by Dean Coza, director of security product management at VMware. Is it just me, or do most companies choose to announce things they want no one to discuss on Friday afternoons [...]
  • Agentless Security Gets an “A” on Its Report Card

    Trend Micro - Cloud Security Blog
    In my last blog post, I discussed some of the benefits of agentless security for virtual and private cloud servers. Today at VMworld, Harish Agastya, Director of Data Center Security at Trend Micro, conducted a presentation on Agentless Security for VMware Environments (listed on the Trend Micro VMworld page). Trend Micro released agentless antivirus in [...]
  • Matching Security to Your Cloud

    Trend Micro - Cloud Security Blog
    There’s a lot of talk about cloud computing and cloud security this week as many people are attending VMworld in Las Vegas (follow Trend Micro at VMworld).  But not all types of cloud security are best suited for all types of cloud computing.  When people generically refer to “cloud computing” they usually mean the public [...]
  • Should We Really Control a Submarine From the Cloud? DARPA Says Yes.

    Trend Micro - Cloud Security Blog
    The agency [DARPA], which engages in technology research for the DOD, is looking for innovative ways to use the cloud to execute applications “when the applications are minimally specific to the particular resources in use,” according to the posted on FedBizOpps.gov. “To date, the cloud computing paradigm has not been effectively exploited in embedded military [...]