- September 26, 2023In this entry, we will discuss publicly exposed registries, which are repositories or databases containing information accessible to the public without the need for authentication.
- November 16, 2021We looked into the security of kubectl plug-ins in Krew and how supply chains' projects can be at risk.
- October 08, 2021Our new report maps the vulnerable cracks in cloud native application security, and shows how this is a growing concern that enterprises should devote time and resources to secure.
- November 16, 2020We take a closer look at an emerging underground market that is driven by malicious actors who sell access to a gargantuan amount of stolen data, frequently advertised in the underground as “cloud of logs."
- February 12, 2020Over 30K records of US inmates were inadvertently exposed through a leaky AWS S3 cloud storage bucket.
- August 16, 2019In a survey commissioned by Trend Micro, majority of the respondents shared their concern for the risks in implementing DevOps. Learn why consulting IT security teams in the initiatives can help bridge gaps between production and security.
- May 22, 2018Here are some considerations and best practices that developers, IT operations professionals, and system administrators should take into account in securing the infrastructures that power the applications they use.
- January 14, 2015While BYOD introduces a flexible workplace for employees, it could also act as a gateway to various attacks. In this video, Trend Micro CTO Raimund Genes proposes a solution to the BYOD problem.
- July 17, 2013Enterprises are moving towards virtualization and cloud computing. However, adopting these new platforms opens new windows of exposure that can be leveraged in data breach attacks.