Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations

  Trend Micro is excited to launch new Trend Micro Cloud One™ – Conformity capabilities that will strengthen protection for Azure resources.   As with any launch, there is a lot of new information, so we decided to sit down with one of the founders of Conformity, Mike Rahmati. Mike is a technologist at heart,…
The post Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations appeared first on . Read More HERE…

Read more

The Fear of Vendor Lock-in Leads to Cloud Failures

  Vendor lock-in has been an often-quoted risk since the mid-1990’s. Fear that by investing too much with one vendor, an organization reduces their options in the future. Was this a valid concern? Is it still today?   The Risk Organizations walk a fine line with their technology vendors. Ideally, you select a set of…
The post The Fear of Vendor Lock-in Leads to Cloud Failures appeared first on . Read More HERE…

Read more

Stay ahead of multi-cloud attacks with Azure Security Center

Stay ahead of attacks and protect your workloads with Azure Security. Join us for demos of Azure Secure Score and Security Center threat protection capabilities, while Stuart Gregg, Security Operations Manager of ASOS, shares how they’ve gained stronger threat protection by pairing these technologies with smarter security management practices.
The post Stay ahead of multi-cloud attacks with Azure Security Center appeared first on Microsoft Security. READ MORE HERE…

Read more

Principles of a Cloud Migration – Security W5H – The HOW

“How about… ya!” Security needs to be treated much like DevOps in evolving organizations; everyone in the company has a responsibility to make sure it is implemented. It is not just a part of operations, but a cultural shift in doing things right the first time – Security by default. Here are a few pointers…
The post Principles of a Cloud Migration – Security W5H – The HOW appeared first on . Read More HERE…

Read more

Is Cloud Computing Any Safer From Malicious Hackers?

Cloud computing has revolutionized the IT world, making it easier for companies to deploy infrastructure and applications and deliver their services to the public. The idea of not spending millions of dollars on equipment and facilities to host an on-premises data center is a very attractive prospect to many. And certainly, moving resources to the…
The post Is Cloud Computing Any Safer From Malicious Hackers? appeared first on . Read More HERE…

Read more

Principles of a Cloud Migration – Security W5H – The WHERE

“Wherever I go, there I am” -Security I recently had a discussion with a large organization that had a few workloads in multiple clouds while assembling a cloud security focused team to build out their security policy moving forward.  It’s one of my favorite conversations to have since I’m not just talking about Trend Micro…
The post Principles of a Cloud Migration – Security W5H – The WHERE appeared first on . Read More HERE…

Read more

Principles of a Cloud Migration – Security W5H – The When

If you have to ask yourself when to implement security, you probably need a time machine! Security is as important to your migration as the actual workload you are moving to the cloud. Read that again. It is essential to be planning and integrating security at every single layer of both architecture and implementation. What…
The post Principles of a Cloud Migration – Security W5H – The When appeared first on . Read More HERE…

Read more

Principles of a Cloud Migration – Security, The W5H – Episode WHAT?

Teaching you to be a Natural Born Pillar! Last week, we took you through the “WHO” of securing a cloud migration here, detailing each of the roles involved with implementing a successful security practice during a cloud migration. Read: everyone. This week, I will be touching on the “WHAT” of security; the key principles required…
The post Principles of a Cloud Migration – Security, The W5H – Episode WHAT? appeared first on . Read More HERE…

Read more