Quantcast
Channel: Trend Cloud Security Blog - Cloud Computing Experts » Threats
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The Small Business Journey to the Cloud is Actually a Round Trip

The Small Business Journey to the Cloud is Actually a Round Trip      By Greg Boyle, Trend Micro Global Product Marketing Manager Many small businesses are still uncertain about cloud computing. They...

View Article



Image may be NSFW.
Clik here to view.

A Tale: The Snack Supplier, the Vending Machine, and the Cloud

I recently had an interesting chat with the operator of our snack vending machine while making a coffee in the kitchen. She was restocking our machine and had her iPad sitting on the table. In their 2...

View Article

Image may be NSFW.
Clik here to view.

Chrome OS: So secure we don’t need security?

With the launch announcements of various Google Chrome netbooks, the focus of the press and security companies alike is beginning to take a closer look at the security promises made and also at some of...

View Article

Image may be NSFW.
Clik here to view.

“Hey, You, Get Off of iCloud!”

For all its hype iCloud does not represent a fundamentally new problem. Employees are already bringing personal devices to work and wanting to use them in their jobs, and these unmanaged devices are...

View Article

Image may be NSFW.
Clik here to view.

What Are the True Dangers of the Cloud?

We often hear that security and privacy concerns are the main inhibitors to cloud adoption.  But what are the true threats?  Is the cloud really more dangerous than your on-site data center?  I would...

View Article


Image may be NSFW.
Clik here to view.

Beyond Perimeter Defense to Data-Centric Security

Traditionally businesses have focused their IT security on perimeter defense—blocking threats before they enter the network. This protection is still important.  But with today’s cloud computing,...

View Article

Image may be NSFW.
Clik here to view.

Savings with Cloud Security — A Look at the Numbers

When people talk about cloud security it can mean either 1) security for the cloud—security that protects your cloud initiatives, like protection for virtual machines or data stored in the cloud; or 2)...

View Article

Image may be NSFW.
Clik here to view.

Do You Encrypt Your Data? A Plea to Businesses from an Identity Theft Victim

Recently I became a victim of identity theft.  Criminals gained access to my name, address, date of birth, driver’s license number, social security number, and bank account number.  I’ve spent the last...

View Article


Image may be NSFW.
Clik here to view.

HIPAA hiccups

Not a month goes by when there isn’t an announcement of a breach of electronic health records thereby disclosing personal and financial data; and that excludes breaches that are not publicly...

View Article


Image may be NSFW.
Clik here to view.

Offense Must Inform Defense: The Importance of Continuous Monitoring

In light of the introduction yesterday of the seminal Cyber Security Act and the Presidents OP-Ed in the WSJ: Taking the Cyberthreat Seriously. It is time we learn a lesson from those learned by the...

View Article
Browsing all 10 articles
Browse latest View live


Latest Images