Security 101: Cloud-native Virtual Patching

Trend Micro – Trend Micro – As an enterprise’s online infrastructures become more complex — from their decentralization to the adoption of cloud, mobile, and internet-of-things (IoT) technologies — patch…

Cybersecurity Basics: Authentication and Authorization

Trend Micro – Trend Micro – What is identity and access management? Identity and access management (IAM) ensures the right people in the right job roles can access the tools,…

Mitigate Top 5 Common Cybersecurity Vulnerabilities

Trend Micro – Trend Micro – Vulnerabilities in software and infrastructure are a fact of life for developers and SREs, but that doesn’t mean you must accept them. Given the…

How to detect Apache Log4j vulnerabilities

Trend Micro – Trend Micro – How to Detect Apache Log4j Vulnerabilities Network Security Explore how to detect Apache Log4j (Log4Shell) vulnerabilities using cloud-native security tools. By: Nitesh Surana January…

Apache Log4j: Mitigation for DevOps

Trend Micro – Trend Micro – Apache Log4j: Mitigation for DevOps Cloud Native What can DevOps teams do to mitigate Apache Log4j risks? Explore how to secure your apps for…

How to detect Apache HTTP Server Exploitation

Trend Micro – Trend Micro – In the above two requests and responses, we see the attacker fingerprinting vulnerable servers by running the ‘echo’ command. We observed successful exploitation attempts…

2022 Cybersecurity Trends for DevSecOps

Trend Micro – Trend Micro – How many articles have you read that started with some variation of “the COVID-19 pandemic accelerated digital transformation?” This concept isn’t new, but you…

Oracle WebLogic Detection and Mitigation

Trend Micro – Trend Micro – Detection and Remediation Now that we’ve covered the vulnerabilities, let’s get into how we can detect and mitigate these critical flaws using a SaaS…

Virtual Patching 101

Trend Micro – Trend Micro – Virtual Patching 101 Network Security Get the lowdown on virtual patching: a simplified, automated solution to shielding vulnerabilities from exploits. By: Trend Micro December…

A Guide to Ransomware: Prevention and Response

Trend Micro – Trend Micro – It seems like every day there’s a new story about a ransomware attack. And while ransomware is certainly costly to the victim, the impact…