Cloud security with MITER ATT & CK for Containers

Cloud security with MITER ATT & CK for Containers

Share post

Shaping the future of cloud security with MITER ATT & CK for Containers. Trend Micro is contributing to a new framework that helps companies build and deploy secure container environments.

Trend Micro, one of the world's leading providers of cloud security, is supporting MITER with research and resources in developing a new framework for container security. Trend Micro threat intelligence was an integral part of the development of ATT & CK® for Containers. MITER benefited from the evidence-based results from several years of dedicated research with which Trend Micro supported the new framework.

Evidence-based results from research

"Trend Micro was one of the companies that answered our call to the community when we began developing ATT & CK for Containers through the Center for Threat-Informed Defense," said Jen Burns, senior cybersecurity engineer at MITER. “We are all working to help companies protect themselves against attacks by using knowledge databases like ATT & CK as a common language. The support of vendors like Trend Micro, who have expertise and experience with actual attacks, help us support the security community in achieving this goal. "

Trend Micro provided data from actual attacks to support seven MITER techniques. Two of these techniques are new and unique to ATT & CK for Containers. Companies can use these to better understand how attackers are targeting container environments and how they can protect themselves from these threats.

ATT & CK for Containers

"I am very pleased that we were able to support MITER in the development of their new container framework," explains Hannes Steiner, Vice President Germany at Trend Micro. “Trend Micro's extensive research activities aim to protect our customers and the digital world from the threats of today and tomorrow. We identified containers as a growing target for attackers a few years ago and worked hard to stay one step ahead of these threats. Partnerships like the one with MITER give our work a far-reaching influence and we are happy to support your endeavors. "

Trend Micro Cloud One - Container Security leverages the company's extensive research expertise to protect customers. The tool is designed to simplify the security of container builds, deployments, and runtime workflows while helping developers accelerate innovation and minimize application downtime in their containerized environments.

More at TrendMicro.com

 


About Trend Micro

As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more