Security 101: Cloud-native Virtual Patching

Trend Micro – Trend Micro – As an enterprise’s online infrastructures become more complex — from their decentralization to the adoption of cloud, mobile, and internet-of-things (IoT) technologies — patch…

Detect Azure AD Hybrid Cloud Vulnerabilities

Trend Micro – Trend Micro – Detect Azure AD Hybrid Cloud Vulnerabilities Workload Security AADInternals is a PowerShell module widely used by administrators for administering Azure Active Directory (AD) and…

Cybersecurity Basics: Authentication and Authorization

Trend Micro – Trend Micro – What is identity and access management? Identity and access management (IAM) ensures the right people in the right job roles can access the tools,…

Mitigate Top 5 Common Cybersecurity Vulnerabilities

Trend Micro – Trend Micro – Vulnerabilities in software and infrastructure are a fact of life for developers and SREs, but that doesn’t mean you must accept them. Given the…

How to Secure AWS Serverless API(s)

Trend Micro – Trend Micro – How to Secure AWS Serverless API(s) Network Security Discover how to easily enhance security of your container-based AWS serverless API to protect against known…

How to detect Apache Log4j vulnerabilities

Trend Micro – Trend Micro – How to Detect Apache Log4j Vulnerabilities Network Security Explore how to detect Apache Log4j (Log4Shell) vulnerabilities using cloud-native security tools. By: Nitesh Surana January…

Apache Log4j: Mitigation for DevOps

Trend Micro – Trend Micro – Apache Log4j: Mitigation for DevOps Cloud Native What can DevOps teams do to mitigate Apache Log4j risks? Explore how to secure your apps for…

How to detect Apache HTTP Server Exploitation

Trend Micro – Trend Micro – In the above two requests and responses, we see the attacker fingerprinting vulnerable servers by running the ‘echo’ command. We observed successful exploitation attempts…

2022 Cybersecurity Trends for DevSecOps

Trend Micro – Trend Micro – How many articles have you read that started with some variation of “the COVID-19 pandemic accelerated digital transformation?” This concept isn’t new, but you…

Oracle WebLogic Detection and Mitigation

Trend Micro – Trend Micro – Detection and Remediation Now that we’ve covered the vulnerabilities, let’s get into how we can detect and mitigate these critical flaws using a SaaS…