Every year, around the new year, we are bombarded with lists of predictions for the coming year. In December 2015, the Trend Micro research team joined in a round of crystal ball gazing. Based on their insights in the ever-evolving cybercrime trends, they formulated some predictions about what to expect in 2016. One year later, as we are entering yet another new year and, once again, looking forward to new trends and developments in 2017, we would also like to take the time to look back and ask ourselves: were these predictions nonsense, or did 2016 prove them to be hard reality? Continue reading
Cybercriminals by and large don’t work to annual schedules. But as a new year rolls around again, there’s a valuable opportunity for organizations to take stock of their IT security posture and consider where the key threats lie over the coming 12 months. One major area highlighted in Trend Micro’s 2017 predictions report, The Next Tier, is in the number of software bugs discovered in non-Microsoft platforms. Continue reading
All or nothing is a really bad strategy for securing your Microsoft Azure workloads. Security in Azure is very much a shared responsibility. You need to know exactly what it is that you must secure, and what is covered by Microsoft.
Microsoft provides robust physical security, network infrastructure, and virtualization layer. Ideally, you will match their excellence with equally robust security for your workloads, including operating system, applications, and data.
But there’s a small catch. If you try to use traditional security to protect your applications and data in the cloud, you risk slowing your Azure project with needless complexity. There’s a simpler and more effective solution. Continue reading
Be aware of your security responsibility !
An increasing number of companies has decided to host their office applications such as Microsoft Word, Excel and Powerpoint in the cloud. Also core services like mail, datastorage and sharepoint are hosted these days. No wonder really, because the underlying principle is very appealing: you no longer need to install software yourself, and the central storage in the cloud allows you to access your data anywhere and from any device. Highly convenient, isn’t it? But beware: switching from onsite applications to their hosted online equivalents also entails a certain degree of risk, particularly when it comes to data security. Continue reading