Security Roundup: Side-Channel Attacks, Trend Micro, Extreme Networks
… run virtualized environments such as public hosting companies, public cloud companies and IT departments that operate private cloud environments that allow for arbitrary virtual machine loads to operate, Ayrapetov said.
“The specific example in which an MSSP can immediately step in to help with side-channel attacks is for their customers that operate private cloud environments,” he said. “What the MSSP should immediately do is assess the processor generations and architectures deployed in their customers’ virtualization environment and immediately apply the vendor-provided patches. Additionally, they can place security technologies such as real-time deep memory inspection (RTDMI) that can scan file transfers against side-channel like attacks.”
Public cloud and private cloud environments are the most susceptible, Ayrapetov said. IT departments running virtual environments that allow arbitrary virtual machine (VM) loads to operate are most in danger, he said.
“If you stop treating cybersecurity as a cost to be minimized and start treating it as a business value in its own right, you open up a lot of mitigations to help you protect against attacks like ZombieLoad, Meltdown and Spectre,” Ducklin said. “You don’t have to wait for the next generation of CPUs to come out if you’re willing to dial performance back a bit right now. At the very least, try it and see; after all, many people used to hate disk encryption ‘because it slows me down,’ only to find that when it was turned on, they couldn’t tell the difference.”
Trend Micro Rolls Out Cloud, Container Protection
Trend Micro has added container security capabilities to Trend Micro Deep Security designed to protect across the entire DevOps lifecycle and runtime stack.
Wendy Moore, Trend Micro’s vice president of product marketing, tells us her company is always trying to enhance and evolve its cloud offerings so that it and its channel partners can grow their market shares in the cloud space.
“Trend Micro Deep Security provides the opportunity to do just that by boosting container platform protection across platforms like Docker and Kubernetes at runtime of the container,” she said. “This solution also bridges the widespread gap between developers and security teams that can often slow down the DevOps cycle. The solution makes collaboration between the teams more simple and efficient by helping to detect vulnerabilities for early protection at build time while also delivering critical threat protection on premises and at runtime. This in turn relieves typical roadblocks and allows businesses to deliver automated, secured applications to market [more quickly]. Another example of opportunity with the new Deep Security capabilities is that they allow partners to expand their solution offerings to their customers, which gives partners greater revenue opportunity.”
Adding the new container security capabilities to Deep Security gives Trend Micro and its partners a competitive advantage because it combines the many different functions that a customer would need into “one highly automated solution,” Moore said.
“While many of our competitors are providing one-off point solutions that address one piece of the entire DevOps life cycle, Trend Micro Deep Security provides build-pipeline container image scanning and extensive runtime protection,” she said. “This makes everything more streamlined, gives customers full visibility and control, and increases protection across the entire runtime stack.”
Growth Anticipated in Global Cybersecurity
Great news for MSSPs and other cybersecurity providers: The global cybersecurity market is expected to reach …