Articles about Cloud

Red Hat announces Project Hummingbird to boost cloud-native development

Software supply chain development

Today’s IT leaders frequently face a critical trade-off between delivery speed and systems security. AI-assisted and -generated coding tools accelerate development cycles, but this speed can run counter to the realities of managing multi-faceted, complicated software components.

This seemingly leaves CIOs with two choices, moving at the speed of business while balancing potential production systems risks, or being overcautious to the point of losing to competitor’s innovations.

Continue reading

Governance failures disrupt cloud migration plans

Cloud migration data

Nearly 40 percent of organizations have experienced security or compliance incidents directly linked to governance gaps introduced during cloud migration according to a new report.

The study from Pathlock, based on responses from 620 enterprise IT, compliance, and security leaders, finds that in spite of the regulatory pressures many organizations face, with respondents operating under major regulations like SOX, GDPR, and others, governance is often treated as an afterthought.

Continue reading

More than half of IT leaders lack resources despite increasing budgets

Budget worry

Although 74 percent of IT leaders expect budgets to rise in 2026 more than half say they still lack the internal resources to fix issues quickly or drive innovation.

A new report from DataStrike also finds 60 percent of organizations now rely on MSPs to manage data infrastructure, more than double the rate reported last year. This highlights a growing dependence on external expertise as teams tackle modernization and technical debt.

Continue reading

Businesses at risk from boom in IoT devices

Internet of things screen

New research from Forescout Vedere Labs reveals that 65 percent of devices across organizations are no longer traditional IT. Of these 11 percent are network equipment, while 24 percent are part of the extended IoT, such as IoT, OT and IoMT.

Financial services (54 percent), healthcare (45 percent) and oil, gas and mining (40 percent) are the sectors that have the highest percentages of non-IT devices.

Continue reading

Implementing runtime security for the cloud [Q&A]

Cloud security lock

Cloud-native platforms are built for speed with ephemeral workloads, rapid deployments, and plenty of third-party app dependencies.

This poses a real challenge to the deployment of runtime security tools. We talked to Bob Tinker, founder and CEO of BlueRock.io, to discuss how organizations can protect their cloud systems effectively.

Continue reading

SonicWall warns its cloud backup service users to reset credential after security incident

SonicWall security breach

Following a previously acknowledged security breach last month, SonicWall has published an updated bulletin to customers having investigated the incident. The company says that it is now aware that an “unauthorized party accessed firewall configuration backup files for all customers who have used SonicWall’s cloud backup service”.

SonicWall has also published an extensive document to help customers with “containment, remediation and monitoring”. This includes advising everyone to reset various passwords.

Continue reading

90 percent of organizations face attacks involving lateral movement

Network attack lateral movement

A new report from Illumio, based on a survey of over 1,100 IT and cybersecurity decision makers, finds that almost 90 percent of leaders have detected a security incident involving lateral movement within the past 12 months.

Each incident involving lateral movement resulted in a global average of over seven hours of downtime. Alert fatigue, along with limited and fragmented visibility, especially across hybrid environments, are two of the top challenges to detecting lateral movement.

Continue reading

Why the cybersecurity industry needs to be more accessible [Q&A]

Cloud vulnerability lock

The proliferation of different cybersecurity tools has created an operational crisis for organizations, with companies struggling to manage an increasing array of defensive technologies.

Organizations today are forced to juggle multiple tools, each with unique UI, costs, and maintenance headaches. They’re also often not able to buy the tools they need, because they are either too expensive or don't exist in the specific capacity they need.

Continue reading

Younger generations embrace the mainframe

Data center technician

Large enterprises have always relied on mainframe computing but with the rise of technologies like the cloud and AI many have predicted that those days are numbered.

Software solutions company BMC has released the results of its 20th annual BMC mainframe survey, which finds that in fact positive perception of the mainframe has reached an all-time high of 97 percent, highlighting that the mainframe remains a vibrant and growing platform.

Continue reading

Proton introduces emergency access to accounts

Emergency ambulance

Imagine the scenario, you’re suddenly hospitalized or incapacitated following an accident but access to important information like insurance details is locked up in your computer and online accounts which no one else can access.

For this and other emergency situations Proton is launching an Emergency Access feature so that passwords and logins, documents and files will be recoverable by trusted individuals in case of an emergency.

Continue reading

Microsoft now saves all Word files to the cloud by default

Microsoft Word saves to cloud

Anyone who has used Microsoft Word for a number of years will remember the times they have been saved by the autosave feature. The move to the cloud complicated things slightly meaning that many people lost files when Microsoft changed the way the feature worked.

Now the company has announced a significant change to Word that will help to dramatically reduce the risk of documents being lost by accident or because of something like a power outage or hardware failure. All Word documents are now saved  to the cloud by default.

Continue reading

Google Drive simplifies video editing

Googe Drive video editing

Google Drive is home to every type of file imaginable, and a decent proportion of those files are videos. It is with this in mind that Google has decided to make it easier to edit videos which have been uploaded to its cloud storage service.

Rather than adding video editing tools directly into Google Drive, the company is instead making it easier to access the option to do so using Google Vids.

Continue reading

Microsoft launches Windows 365 Reserve preview to reduce downtime

Windows 365 Reserve

Microsoft has launched a limited public preview of Windows 365 Reserve, a new cloud-based service to help reduce downtime and disruption for business when disaster strikes.

Whether there is a system failure, a cyberattack, or something else goes wrong, Windows 365 Reserve provides access to a Cloud PC to help reduce disruptions. Microsoft says that it offers businesses “secure and on-demand Cloud PC access from anywhere when you need it most”.

Continue reading

New agentic AI platform helps teams fix cloud security problems faster

Cloud security padlocks

Security teams are often hampered by having to identify and fix issues while weeding out false positives. This is an area where AI can help and Sysdig has launched a new agentic platform designed to analyze cloud environments end-to-end and uncover hidden business risk so organizations can remediate crucial threats fast and deliver measurable improvements in their security posture.

Sysdig Sage, the company’s AI cloud security analyst, ultimately understands context from the entire business and provides clear, contextual remediation recommendations, reducing an organization’s exposure time to critical vulnerabilities.

Continue reading

Cloud accounts come under attack as identity threats rise

Cloud security lock

The latest Threat Detection Report update from Red Canary shows a rise of almost 500 percent in detections associated with cloud accounts during the first half of 2025.

This significant rise stems primarily from Red Canary’s expanded identity detection coverage and the implementation of AI agents designed to identify unusual login patterns and suspicious user behaviors. This includes identifying logins from unusual devices, IP addresses, and virtual private networks (VPNs), which significantly increases the detection of risky behaviors.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.