Log in
E-mail
Password
Show password
Remember
Forgot password ?
Become a member for free
Sign up
Sign up
New member
Sign up for FREE
New customer
Discover our services
Settings
Settings
Dynamic quotes 
OFFON
  1. Homepage
  2. Equities
  3. Japan
  4. Japan Exchange
  5. Trend Micro
  6. News
  7. Summary
    4704   JP3637300009

TREND MICRO

(4704)
  Report
SummaryQuotesChartsNewsRatingsCalendarCompanyFinancialsConsensusRevisions 
SummaryMost relevantAll NewsOther languagesPress ReleasesOfficial PublicationsSector news

Trend Micro Incorporated : What You Can Do to Mitigate Cloud Misconfigurations

11/30/2021 | 09:23am EST

Our data also showed a high frequency of Amazon Simple Storage Service (S3) rule violations. Still, it is necessary to examine the data further before fearing for the worst. For one, not all Amazon S3 buckets are supposed to be encrypted. In some instances, encryption is not needed. These are cases where the data needs to be served in clear text such as for public sites or data that needs to be openly accessed through an application.

While encryption can be done on a case-to-case basis, data classification cannot and should be done in all instances. What are you putting into the storage container? Should it be encrypted? It is necessary to always answer these questions. Since cloud security posture management (CSPM) technologies should not have access to your data (and neither should your cloud provider), it is up to your organization to determine the encryption level of your data. It is therefore a must for organizations to review whether they do conduct such assessments, as well as if they have visibility over what is happening within their cloud.

Overall, the high-severity misconfigurations we enumerated in our report can lead to significant consequences, mostly because of their potential for data breaches. Some of the consequences of data breach include reputational damage, data privacy law violations, and operational issues.

The worst-case scenario that a data breach can have for organizations is the loss of business. Customers and businesses expect the strongest security with respect to their data and intellectual property. If any of these are violated, organizations will likely face reputational damage.

The good thing about misconfigurations is that you can do something about them. What makes attacks that stem from a misconfiguration difficult to live down is how they could have been easily avoided had the misconfiguration been noticed in the first place. Nevertheless, we still recommend learning what you can do to mitigate cloud misconfigurations.

Automating security

Automation and visibility are the number one problem we see within our customer cloud environments today. While there is indeed talent in tech to handle safely moving to the cloud, there is also a shortage of employees. DevOps teams are building at record pace and releasing applications daily or hourly, but security teams cannot always keep up. One way they can do so is to automate and augment their work. Having software-defined infrastructure (SDI), infrastructure as code (IaC), and up-to-date templates and containers assist with respect to automation and augmentation.

Automating compliance

Building compliance into the automation cycle used by the organization should be considered a baseline measure. This is an important standard set by cloud providers. With regard to the cloud, security must go beyond various global standards to include those referenced by cloud providers, in addition to best practices for an organization's specific industry.

Upskilling the workforce

The cloud and DevOps are developing quickly. However, cybersecurity is not ingrained in students or future programmers. Programmers do not have an inherent security-driven focus when developing their work, so bugs that affect security happen constantly. IaC and SDI, as well as the integration of CSPM in the DevOps cycle, help with this challenge. In short, upskilling people can ensure security from the design phase. As the saying goes, "shifting left" is good, but "starting left" is better.

Overall, it is important to understand that the cloud is fallible. Its security is a responsibility shared by the cloud service provider (CSP) and the organization. Organizations should thus do their part and live up to their role in keeping their cloud environments secure.

This can be a daunting task, especially when organizations have had to quickly cope with the demands of a global pandemic. Still, security must be prioritized to avoid even heavier consequences and to build more confidence in cloud environments.

Disclaimer

Trend Micro Inc. published this content on 30 November 2021 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 30 November 2021 14:20:01 UTC.


ę Publicnow 2021
All news about TREND MICRO
06:05aNEW RANSOMWARE SPOTTED : White Rabbit and Its Evasion Tactics
PU
01/17TREND MICRO : Earth Lusca Employs Sophisticated Infrastructure, Varied Tools and Technique..
PU
01/14CYBERSECURITY FOR INDUSTRIAL CONTROL : Part 1
PU
01/14CODEX EXPOSED : How Low Is Too Low When We Generate Code?
PU
01/14TREND MICRO : Analyzing an Old Bug and Discovering CVE-2021-30995
PU
01/11LORAWAN'S PROTOCOL STACKS : The Forgotten Targets at Risk
PU
01/10TREND MICRO INCORPORATED : Uncovering and Defending Systems Against Attacks With Layers of..
PU
01/07CODEX EXPOSED : Exploring the Capabilities and Risks of OpenAI's Code Generator
PU
01/07TREND MICRO INCORPORATED : This Week in Security News - January 7th, 2022
PU
2021Nikkei retreats from 1-month high as chip stocks track U.S. peers lower
RE
More news
Financials
Sales 2021 188 B 1 642 M 1 642 M
Net income 2021 34 962 M 305 M 305 M
Net cash 2021 182 B 1 588 M 1 588 M
P/E ratio 2021 22,9x
Yield 2021 3,32%
Capitalization 807 B 7 043 M 7 042 M
EV / Sales 2021 3,32x
EV / Sales 2022 3,06x
Nbr of Employees 6 975
Free-Float -
Chart TREND MICRO
Duration : Period :
Trend Micro Technical Analysis Chart | MarketScreener
Full-screen chart
Technical analysis trends TREND MICRO
Short TermMid-TermLong Term
TrendsBearishNeutralNeutral
Income Statement Evolution
Consensus
Sell
Buy
Mean consensus HOLD
Number of Analysts 12
Last Close Price 5 780,00 JPY
Average target price 6 983,64 JPY
Spread / Average Target 20,8%
EPS Revisions
Managers and Directors
Yi Fen Chen Auditor
Mahendra Negi Group CFO, COO & Representative Director
Ming Jang Chang Representative Director
Max Cheng Chief Information Officer & Executive VP
Kevin Simzer Chief Operating Officer
Sector and Competitors
1st jan.Capi. (M$)
TREND MICRO-9.23%7 067
MICROSOFT CORPORATION-7.77%2 328 976
SEA LIMITED-21.76%98 356
ATLASSIAN CORPORATION PLC-22.00%75 166
DASSAULT SYSTÈMES SE-11.92%69 154
SYNOPSYS INC.-11.49%50 045