Articles about Cloud

Forecasting the cloud security landscape in 2020

cloud magnifier

Every year, threat actors will continue to evolve their current tactics, techniques, and procedures (TTPs) that they use in order to exfiltrate customer, company and partner data, interrupt business operations, implant ransomware, and more. In fact, cybercrime damage costs are predicted to hit $6 trillion annually by 2021, according to research from Cybersecurity Ventures. In 2020, as cybercriminals refine their methods, we will continue to see a plethora of breaches occur due to a common vulnerability: misconfigurations.

Despite organizations running an average of 40 percent of their workloads in the public cloud, most companies fail to be able to accurately identify the risk of misconfiguration in public cloud as higher than the risk in traditional IT environments. In the new year we will also see a greater focus placed on identity in cloud security -- a challenge that’s easier said than done, since approaches that worked in traditional data center environments do not translate to the cloud.

Continue reading

How the real-time data gold rush creates steep learning curves for developers [Q&A]

real-time data

By 2025, industry analyst firm IDC predicts that 30 percent of all data will be real-time. The avalanche of streaming data frameworks, libraries and processing engines has created a massive learning curve for developers.

We spoke with Craig Blitz, product director of cloud native application platform Lightbend to learn more about where we are in these early days of streaming data development, and how Lightbend's newly launched open source framework, Cloudflow, aims to support developers pursuing real-time use cases.

Continue reading

IT professionals are still keen to embrace the cloud

Cloud growth arrow

Of organizations with on-premise data centers, 88 percent plan on moving at least some of their workloads to the cloud, managed hosting or co-location in the next three years.

This is one of the findings of a new State of IT Infrastructure Management report from data center and cloud solutions firm INAP, which also finds 38 percent of IT professionals expect to see a reduction in their on-premise workloads by 2022.

Continue reading

Google and Fortanix deliver external key management for public cloud

cloud key

Migrating sensitive data to the cloud inevitably raises concerns surrounding compliance and security. Most turn to encryption as a solution, but that in itself raises issues over key management.

While many cloud service providers have allowed customers to bring their own keys (BYOK), Google Cloud Platform is linking up with the Fortanix Self-Defending Key Management Service (SDKMS) to become the first public cloud provider to enable customers to bring their own key management system (BYOKMS).

Continue reading

New solution uses the cloud to simplify identity management

identity verification

Digital identity platform ForgeRock is launching an Identity Platform-as-a-Service solution to help developers embed modern identity capabilities into their apps.

ForgeRock Identity Cloud provides a full suite of capabilities for identity requirements in any business environment utilizing the same APIs and SDKs as the ForgeRock Identity Platform, so customers can use ForgeRock in any deployment model, on premises, hybrid cloud, public cloud, or as-a-service.

Continue reading

Microsoft updates cloud contracts after EU privacy complaints

Microsoft cloud in hands

Microsoft has announced changes to its Online Services Terms for commercial cloud customers after an EU investigation raise concerns about existing policies' compliance with European regulation.

The company bills the changes as the introduction of "more privacy transparency" in the wake of a probe into potential violations of GDPR relating to telemetry data collected from Office 365 users. Microsoft says the new contractual terms will be offered to customers globally, not just within Europe.

Continue reading

Database containing details of nearly half a million gamers exposed in security lapse

Magic: The Gathering

Wizards of the Coast -- publisher of, among other titles, Magic: The Gathering -- has confirmed a security incident that exposed information relating to 452,634 players.

The company left a backup database containing gamer information in a public Amazon Web Services storage bucket where it was accessible from early September. Specifically, the database was used to house data relating to the game's online portal, Magic: The Gathering Arena.

Continue reading

Amazon fights Microsoft's JEDI contract win in court over bias claims

Amazon parcels

When Microsoft was awarded the controversial $10 billion JEDI contract by the US Department of Defense, many people voiced surprise -- including rival bidder Amazon.

Now Jeff Bezos' company is heading to court, claiming that the process of choosing who to assign the contract to was biased. But these claims have been denied, with the Department of Defense saying there was no outside influence involved in the decision.

Continue reading

Almost three quarters of enterprises are bringing applications back on premises

resistance to cloud

Applications are migrating away from the public cloud and back to on-premise infrastructures, with 73 percent of respondents to a new study reporting that they are moving some applications off the public cloud and back on premises.

The report from enterprise cloud computing company Nutanix shows 22 percent of those users are moving five or more applications back in house.

Continue reading

Strategy errors mean cloud migrations are failing

Cloud fail

More than a third of US businesses say they've failed to realize notable benefits from cloud computing, largely because they haven't integrated their adoption plan as a core part of a broader business transformation strategy.

This is according to a new Cloud Success Barometer study by Unisys Corporation which looked at the impact and importance of cloud by surveying 1,000 senior IT and business leaders in 13 countries.

Continue reading

New cloud integrations help streamline big data use

cloud data cable

As users and enterprises demand more added capacity, particularly for their data-driven workloads, they are increasingly moving towards all cloud or hybrid cloud environments.

This needs cloud data orchestration to accelerate and synchronize data across different environments, and as a result users are turning to cloud data analytic services like Amazon's EMR and Google Cloud's Dataproc that reduce hardware spend, eliminate the need to overbuy capacity, and provide business agility.

Continue reading

Dropbox Transfer exits beta and lets you share files of up to 100GB

Dropbox

If you need to send large -- and we mean LARGE -- files to someone, your options are a little limited. However, thanks to Dropbox Transfer, you now have a new possibility to explore.

Previously available in beta, Dropbox Transfer is now available to everyone. It's a cloud-based tool that lets you share files of up to 100GB in size with others, and even if you have used the beta version, there are now new features to explore.

Continue reading

Unisys launches new cloud-based biometric identity service

Biometrics

With increasing awareness of fraud and identity theft businesses are under pressure to secure their systems and many are turning to solutions like biometrics to do so.

To bring biometric identity-proofing and authentication capabilities within reach of both large and small enterprises, Unisys is launching an SaaS version of its biometric identity management software.

Continue reading

Trustwave launches advanced threat detection for Azure

web threats

As increasing numbers of businesses shift to cloud and multi-cloud environments, securing systems becomes a much more complex task.

For Microsoft Azure users Trustwave is launching new services to bolster threat monitoring, detection and response natively on the platform.

Continue reading

How automation can contribute to cloud security [Q&A]

Secure cloud

Attacks on cloud systems often take advantage of misconfigurations, something which can easily go undetected.

Can today's security operations teams use automation and leverage advanced analytics to adapt to the current, cloud-based threat landscape and maintain organizational safety?

Continue reading

© 1998-2019 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.