Category Archives: Data protection

Securing Cloud Workloads: Making DevSecOps a Reality at VMworld Europe

by Bharat Mistry

You might have noticed new official ONS figures claiming a 30% drop in cybercrime in the UK over the past year. But don’t be misled by the headline stats: the truth is that threats, especially against organisations, are on the rise. Trend Micro blocked over 20.4 billion of them in the first half of the year alone. The risks are especially pronounced during the app development lifecycle when the focus can sometimes fall too heavily on time-to-market, at the expense of security. That’s why cloud workload security is one of the top two IT budget priorities for 2019, according to a new study.

As organisations increasingly look to DevOps to drive innovation and growth, the need to seamlessly integrate security controls pre-deployment and at runtime becomes more urgent. Join us at VMworld Europe next month to find out how Trend Micro is helping global organisations manage these challenges. Continue reading

Mitigating the Threat of the World’s Top Hacking Tools

By Bharat Mistry

When it comes to cybersecurity, information is power. So we were pleased recently to see GCHQ’s  National Cyber Security Centre (NCSC) release a new document highlighting the five most common publicly available hacking tools. Although far from exhaustive, it will provide some much-needed guidance for security teams on what to look out for and how to maximise detection and protection.

Those operating VMware environments and looking to follow this best practice advice would do well to consider our flagship Deep Security offering. As we’ll be discussing at VMworld Europe next month, the combination of tight integration and full-featured security is a winner for protecting software-defined datacentres and hybrid cloud environments.

The top hacking tools
Perhaps the most telling thing about the NCSC report is that it had to be produced at all. It’s very much a sign of the times: a reminder of how the cybercrime underground has democratised hacking tools for widespread use. According to the report, produced in concert with cybersecurity specialists from all Five Eyes nations, initial compromise is usually achieved via exploitation of software vulnerabilities or poorly configured systems. After that, hackers may use:

Remote Access Trojans (RATs): like JBiFrost which could be used to install backdoors and key loggers, take screen shots, and exfiltrate data.

Web shells: like China Copper — malicious scripts which offer remote administrative capabilities.

Credential stealers: like Mimikatz which steal user log-ins so an actor can move internally through a target network.

Lateral movement frameworks: like PowerShell Empire which allow attackers to move around once inside a network.

C2 obfuscation tools: like HTran which help to disguise the bad guys’ location when compromising a victim.

There’s a long list of recommendations from NCSC for firms looking to better detect and protect themselves from such threats. But among the key pieces of advice are:

Keep systems patched and up-to-date
Use “modern systems and software”
Employ network monitoring and firewalls
Implement network segmentation
Deploy host-based intrusion detection
Whitelist applications
Use AV from a reputable provider

Partnering on security

These recommendations play very much to Trend Micro’s strengths as a security pioneer and a decade-long partner of VMware’s with our flagship datacentre product Deep Security. We offer:

Anti-malware, firewall, log inspection, web reputation, integrity monitoring, and IDS/IPS and Application Control
Comprehensive security controls automatically deployed as each new VM is spun up
Virtual patching to keep apps/servers shielded from emerging threats until a patch becomes available
Support for NSX for hypervisor-based security, enabling micro-segmentation

All of this comes with an architecture designed to optimise performance in virtual environments, and offer enhanced visibility across physical, virtual and hybrid cloud IT from a single console. Trend Micro on VMware realises the NCSC’s vision of “modern” systems and software designed with security in mind.

We’ll be taking this message to VMworld next month, with two speaking slots slated:

Enabling Hybrid Cloud Security for NSX and VMWare Cloud on AWS [SAI1032BES]
Bryan Webster, Principal Architect, Trend Micro
Jeremiah Cornelius, Security Envisioning Architect – Partner Products – VMware Global Technology Alliance, VMware
Wednesday, Nov 07, 3:30 p.m. – 4:30 p.m.

Mind the Gap: Building a closer relationship between Security and DevOps [DEV1031BES]
Bryan Webster, Principal Architect, Trend Micro
Doug Cahill, Group Director and Senior Analyst , Enterprise Strategy Group
Wednesday, Nov 07, 12:30 p.m. – 1:30 p.m.

We look forward to seeing you at the show.

What: VMworld Europe
Where: Barcelona
When: 5-8 November

Trend Micro at VMworld: driving the cloud-powered enterprise

by Bharat Mistry

As a security leader we understand that forging close industry partnerships is vital to ensuring we continue to offer our customers the best protection and optimal performance. In the new era of cloud and virtual environments, this becomes even more important, which is why we’ve been a close partner of VMware’s for a decade now.

Our appearance at VMworld Europe in November will be a great opportunity to articulate how Trend Micro can help VMware customers extend NSX to the public cloud, and drive a closer relationship between security and DevOps to improve hybrid cloud threat protection. Continue reading

By Design and by Default: Why Firms Must Include Security Teams in IoT Projects

by Bharat Mistry

As organisations build out their Internet of Things (IoT) infrastructure, cyber-risk must be properly managed. Unfortunately, the latest research from Trend Micro has found that security teams are still not being consulted in the majority of global enterprise projects. It’s a major mistake and one which could come back to bite firms if their IoT systems are not secured “by design and default” as required by the GDPR.

If there’s one thing attendees took away from the ever-popular Trend Micro CLOUDSEC conference this week, it’s that online threats are only going to continue escalating. Continue reading