Microsegmentation architecture choices and how they differ

Despite a string of improvements over the past several years, enterprises can no longer rely on perimeter defenses alone to keep out network attackers. Microsegmentation directly addresses the challenge of unauthorized lateral movements by dividing IT environments into controllable compartments, enabling adopters to securely isolate workloads from each other while making network protection more granular. As cyber-attackers continue to try new ways to dodge security measures and roam across IT environments, microsegmentation is moving into the mainstream.To read this article in full, please click here READ MORE HERE…

Read more

How microsegmentation architectures differ

Despite a string of improvements over the past several years, enterprises can no longer rely on perimeter defenses alone to keep out network attackers. Microsegmentation directly addresses the challenge of unauthorized lateral movements by dividing IT environments into controllable compartments, enabling adopters to securely isolate workloads from each other while making network protection more granular. As cyber-attackers continue to try new ways to dodge security measures and roam across IT environments, microsegmentation is moving into the mainstream.To read this article in full, please click here READ MORE HERE…

Read more

Cisco says to patch critical UCS security holes now

Cisco has posted a package of 17 critical security warnings about authentication vulnerabilities in its Unified Computing System that could let attackers break into systems or cause denial of service troubles.Specifically the problems are with Cisco’s UCS Director and Express which let customers build private-cloud systems and support automated provisioning processes and orchestration to optimize and simplify delivery of data-center resources, the company said.To read this article in full, please click here READ MORE HERE…

Read more

IBM extends z15 mainframe family, intensifies Linux security

IBM continued to reshape the mainframe with an eye toward further integrating it within hybrid clouds and securing Linux-based workloads.On the hardware side, IBM rolled out two entry-level, 19” single-frame, air-cooled platforms, the  z15 Model T02 and LinuxONE III Model LT2. The new machines are extensions of the IBM z15 family that Big Blue rolled out in September of last year. To read this article in full, please click here READ MORE HERE…

Read more

Letter from the CEO: A time of kindness and compassion

Dear Customers, Together, we are facing a truly unprecedented situation and we have all had to adapt to the new reality. The global coronavirus pandemic is affecting our families, our communities, our organizations – indeed, it affects our perspective and way of life. As you certainly have too, at Trend Micro we have been busy…
The post Letter from the CEO: A time of kindness and compassion appeared first on . Read More HERE…

Read more

What do serverless compute platforms mean for security?

By Kyle Klassen Product Manager – Cloud Native Application Security at Trend Micro Containers provide many great benefits to organizations – they’re lightweight, flexible, add consistency across different environments and scale easily. One of the characteristics of containers is that they run in dedicated namespaces with isolated resource requirements. General purpose OS’s deployed to run…
The post What do serverless compute platforms mean for security? appeared first on . Read More HERE…

Read more

UPDATE 4-10: How enterprise networking is changing with a work-at-home workforce

As the coronavirus spreads, public and private companies as well as government entities are requiring employees to work from home, putting unforeseen strain on all manner of networking technologies and causing bandwidth and security concerns.  What follows is a round-up of news and traffic updates that Network World will update as needed to help keep up with the ever-changing situation.  Check back frequently!UPDATE 4.10
Verizon Wireless cell-network data indicates how well its customers in the U.S. are staying put during the coronavirus pandemic, with some regions of the country doing far better than others.The carrier sees a general decline in the number of cell-site handoffs that take place when data sessions move from one tower to another as people move around.To read this article in full, please click here READ MORE HERE…

Read more

This Week in Security News: Exploring Common Threats to Cloud Security and Zoom Removes Meeting IDs from App Title Bar to Improve Privacy

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about why Zoom has released an update for its Linux, Mac, and Windows apps that removes the meeting ID from the app’s title bar. Also, read…
The post This Week in Security News: Exploring Common Threats to Cloud Security and Zoom Removes Meeting IDs from App Title Bar to Improve Privacy appeared first on . Read More HERE…

Read more

Cloud Transformation Is The Biggest Opportunity To Fix Security

This overview builds on the recent report from Trend Micro Research on cloud-specific security gaps, which can be found here. Don’t be cloud-weary. Hear us out. Recently, a major tipping point was reached in the IT world when more than half of new IT spending was on cloud over non- cloud. So rather than being…
The post Cloud Transformation Is The Biggest Opportunity To Fix Security appeared first on . Read More HERE…

Read more