Every year, threat actors will continue to evolve their current tactics, techniques, and procedures (TTPs) that they use in order to exfiltrate customer, company and partner data, interrupt business operations, implant ransomware, and more. In fact, cybercrime damage costs are predicted to hit $6 trillion annually by 2021, according to research from Cybersecurity Ventures. In 2020, as cybercriminals refine their methods, we will continue to see a plethora of breaches occur due to a common vulnerability: misconfigurations.
Despite organizations running an average of 40 percent of their workloads in the public cloud, most companies fail to be able to accurately identify the risk of misconfiguration in public cloud as higher than the risk in traditional IT environments. In the new year we will also see a greater focus placed on identity in cloud security -- a challenge that’s easier said than done, since approaches that worked in traditional data center environments do not translate to the cloud.
By 2025, industry analyst firm IDC predicts that 30 percent of all data will be real-time. The avalanche of streaming data frameworks, libraries and processing engines has created a massive learning curve for developers.
We spoke with Craig Blitz, product director of cloud native application platform Lightbend to learn more about where we are in these early days of streaming data development, and how Lightbend's newly launched open source framework, Cloudflow, aims to support developers pursuing real-time use cases.
Of organizations with on-premise data centers, 88 percent plan on moving at least some of their workloads to the cloud, managed hosting or co-location in the next three years.
This is one of the findings of a new State of IT Infrastructure Management report from data center and cloud solutions firm INAP, which also finds 38 percent of IT professionals expect to see a reduction in their on-premise workloads by 2022.
Migrating sensitive data to the cloud inevitably raises concerns surrounding compliance and security. Most turn to encryption as a solution, but that in itself raises issues over key management.
While many cloud service providers have allowed customers to bring their own keys (BYOK), Google Cloud Platform is linking up with the Fortanix Self-Defending Key Management Service (SDKMS) to become the first public cloud provider to enable customers to bring their own key management system (BYOKMS).
Digital identity platform ForgeRock is launching an Identity Platform-as-a-Service solution to help developers embed modern identity capabilities into their apps.
ForgeRock Identity Cloud provides a full suite of capabilities for identity requirements in any business environment utilizing the same APIs and SDKs as the ForgeRock Identity Platform, so customers can use ForgeRock in any deployment model, on premises, hybrid cloud, public cloud, or as-a-service.
Microsoft has announced changes to its Online Services Terms for commercial cloud customers after an EU investigation raise concerns about existing policies' compliance with European regulation.
The company bills the changes as the introduction of "more privacy transparency" in the wake of a probe into potential violations of GDPR relating to telemetry data collected from Office 365 users. Microsoft says the new contractual terms will be offered to customers globally, not just within Europe.
Wizards of the Coast -- publisher of, among other titles, Magic: The Gathering -- has confirmed a security incident that exposed information relating to 452,634 players.
The company left a backup database containing gamer information in a public Amazon Web Services storage bucket where it was accessible from early September. Specifically, the database was used to house data relating to the game's online portal, Magic: The Gathering Arena.
When Microsoft was awarded the controversial $10 billion JEDI contract by the US Department of Defense, many people voiced surprise -- including rival bidder Amazon.
Now Jeff Bezos' company is heading to court, claiming that the process of choosing who to assign the contract to was biased. But these claims have been denied, with the Department of Defense saying there was no outside influence involved in the decision.
Applications are migrating away from the public cloud and back to on-premise infrastructures, with 73 percent of respondents to a new study reporting that they are moving some applications off the public cloud and back on premises.
The report from enterprise cloud computing company Nutanix shows 22 percent of those users are moving five or more applications back in house.
More than a third of US businesses say they've failed to realize notable benefits from cloud computing, largely because they haven't integrated their adoption plan as a core part of a broader business transformation strategy.
This is according to a new Cloud Success Barometer study by Unisys Corporation which looked at the impact and importance of cloud by surveying 1,000 senior IT and business leaders in 13 countries.
As users and enterprises demand more added capacity, particularly for their data-driven workloads, they are increasingly moving towards all cloud or hybrid cloud environments.
This needs cloud data orchestration to accelerate and synchronize data across different environments, and as a result users are turning to cloud data analytic services like Amazon's EMR and Google Cloud's Dataproc that reduce hardware spend, eliminate the need to overbuy capacity, and provide business agility.
If you need to send large -- and we mean LARGE -- files to someone, your options are a little limited. However, thanks to Dropbox Transfer, you now have a new possibility to explore.
Previously available in beta, Dropbox Transfer is now available to everyone. It's a cloud-based tool that lets you share files of up to 100GB in size with others, and even if you have used the beta version, there are now new features to explore.
With increasing awareness of fraud and identity theft businesses are under pressure to secure their systems and many are turning to solutions like biometrics to do so.
To bring biometric identity-proofing and authentication capabilities within reach of both large and small enterprises, Unisys is launching an SaaS version of its biometric identity management software.
Attacks on cloud systems often take advantage of misconfigurations, something which can easily go undetected.
Can today's security operations teams use automation and leverage advanced analytics to adapt to the current, cloud-based threat landscape and maintain organizational safety?