Articles about Cloud

Qualys launches cloud-based risk operations center

Organizations are facing an ever-growing volume of risk alerts spread across multiple, disconnected top-10 dashboards. This fragmented view can result in conflicting analyses, duplicate work, missed threats, and strategies that fail to fully protect the organization.

Cloud-based security firm Qualys is addressing this with the launch of a new Risk Operations Center (ROC) with Enterprise TruRisk Management (ETM) that enables CISOs and business leaders to manage cybersecurity risks in real time, transforming fragmented, siloed data into actionable insights that align cyber risk operations with business priorities.

Continue reading

'Toxic cloud triad' puts four in 10 organizations at risk

It might sound like a Chinese secret society, but a new report warns that a 'toxic cloud triad' of publicly exposed, critically vulnerable and highly privileged cloud workloads is putting almost four in 10 organizations at risk.

Security gaps caused by misconfigurations, risky entitlements and vulnerabilities combine to dramatically increase cloud risk according to the Tenable Cloud Risk Report.

Continue reading

Do you know where your sensitive data is?

Around a quarter of businesses don't know where their sensitive data is according to a new report from Normalyze and the Enterprise Strategy Group (ESG).

As enterprises move more operations to the cloud, the volume and exposure of sensitive data stored in public cloud services is also rapidly increasing. Despite efforts by security teams to manage data risks, many organizations lack clarity on where data is located, how sensitive it is, and who has access to it.

Continue reading

The top enterprise cloud threats of 2024

A new report from IBM X-Force looks at the biggest risks enterprises are facing and highlights how attackers know that credentials are the keys to cloud environments, making them highly sought-after on dark web marketplaces.

Attackers are using phishing, keylogging, watering hole and brute force attacks to harvest credentials. Also dark web research highlights the popularity of infostealers, used to steal cloud platform and service-specific credentials.

Continue reading

New AI-driven platform simplifies enterprise access management

Traditional processes for ensuring employees have the right levels of access to systems have come under strain and become harder to manage because of the spread of cloud-based software.

A new AI-powered identity governance and administration (IGA) platform from Zilla Security aims to tackle the long-standing challenge of managing hundreds of roles or group membership rules to ensure organizations give users job-appropriate access.

Continue reading

Proton launches secure cloud storage for businesses

Swiss company Proton is known for its privacy focused solutions including secure mail, VPN and password manager. Today the company launches a new service, Proton Drive for Business.

This is a comprehensive solution designed to provide secure and private cloud storage, file sharing, and real-time document collaboration for organizations. In an era where data breaches and unauthorized use of company documents are common, this new service offers security and privacy to businesses of all sizes, with end-to-end encryption.

Continue reading

Business security: Advancements in on-premise and online tech solutions

Biometric access control, video surveillance, and intrusion alarms enhance on-site protection by promptly addressing unauthorized access -- these advanced systems monitor who enters your facilities and allow for real-time responses to incidents.

Meanwhile, cybersecurity remains a key aspect of business demanding great attention. The emergence of generative AI and automation technologies can evaluate threats and make decisions significantly faster, heightening the effect of your defense mechanisms.

Continue reading

Multi-cloud, multi-challenge -- what's the answer?

With more business applications and data existing outside of the traditional network perimeter and across multiple clouds, organizations have a harder job than ever before to maintain security and reliability of critical services. This challenge is shared by the majority of IT leaders -- as 81 percent recently surveyed believe the increasing number of cloud applications is adding additional pressure on network performance.

This issue is heightened by the 44 percent of UK workers that now work remotely. Every new remote worker and device added to the organization's network, also expands its attack surface. In fact, 85 percent of IT leaders say remote and hybrid working has contributed to an increase in network security threats. Over two-thirds (69 percent) of UK organizations have experienced an increase in network security threats in the past 18 months.

Continue reading

Enterprises face major challenges with cloud costs and more

A new study reveals that 93 percent of enterprise platform teams face persistent challenges with cloud costs, Kubernetes complexity and developer productivity.

The research from Rafay Systems shows that despite the widespread adoption of platform teams within IT organizations, survey respondents across the board confirm that these teams often are stretched to their limits managing complex multi-cluster Kubernetes and cloud environments.

Continue reading

Mastering tenant-to-tenant cloud migrations: Strategies for success

Tenant-to-tenant cloud migrations have become pivotal for organizations striving to boost operational efficiencies and seamlessly adapt to dynamic changes such as mergers, acquisitions, and organizational restructuring.

These migrations are about more than transferring data and applications between cloud environments. They also represent a strategic move towards greater scalability and improved resource management, enabling businesses to respond more agilely to market demands and growth opportunities.

Continue reading

Azure outages should spark new urgency for a multi-cloud approach

July 19th 2024 will go down as a tough day for many IT teams, and the day started even worse for businesses using Microsoft Azure and its supported services. In addition to the widely publicized global outage caused by a CrowdStrike update, Microsoft Azure's Central US Region was down for five hours due to an unrelated failure, impacting millions of business users worldwide.

As if that wasn't enough, less than two weeks later, Microsoft Azure experienced another global outage lasting more than six hours. According to the company's service status page, it was Microsoft's 8th service status-related incident.

Continue reading

Get 'Deep Learning Approaches to Cloud Security' (worth $190) for FREE

Covering one of the most important subjects to our society today, Deep Learning Approaches to Cloud Security delves into solutions taken from evolving deep learning approaches, solutions allowing computers to learn from experience and understand the world in terms of a hierarchy of concepts, with each concept defined through its relation to simpler concepts.

Deep learning is the fastest growing field in computer science. Deep learning algorithms and techniques are found to be useful in different areas like automatic machine translation, automatic handwriting generation, visual recognition, fraud detection, and detecting developmental delay in children. However, applying deep learning techniques or algorithms successfully in these areas needs a concerted effort, fostering integrative research between experts ranging from diverse disciplines from data science to visualization.

Continue reading

Migrating to the cloud: The key to business scalability, flexibility and cost-effectiveness 

Whenever a new technology hits the business mainstream, key decision makers try to figure out how it can be incorporated into their existing workflows. This is driven by the need to stay on the cutting edge and not lose out to competitors, as well as the goal of constantly improving efficiency and cutting costs. The most obvious current example of this is AI, which is the hot new piece of technology that businesses are trying to utilize. The other main technology that exemplifies this is cloud computing. 

There are many reasons organizations are looking to the cloud as a business enabler, with scalability, flexibility, and cost-effectiveness being only a portion of the long list. Any business that is not currently considering incorporating some aspect of cloud technology into their existing systems will fall behind compared to the rest of the industry, due to the many ways in which it can benefit workflows and help drive revenue. 

Continue reading

Cloud and AI expansion lead to data protection challenges

Enterprise IT leaders are grappling with unprecedented challenges in data protection and governance, driven by the rapid adoption of cloud applications and generative AI, according to a new report.

The study from backup and recovery platform Keepit finds that although 70 percent of respondents report that their financial applications are covered by data protection strategies, a significant portion of other key systems and custom applications remain vulnerable.

Continue reading

Cloud security vendors with cloud cultures: Operating in sync with customers  

Cloud security

Cloud-native security companies understand that while digital transformation is the future for most, if not all, organizations across industries, it’s also introducing a host of new cybersecurity challenges that customers need support navigating. For example, as hybrid work and distributed workforces become more normalized, there’s a growing need for solutions and processes to ensure this anytime, anywhere collaboration happens securely. Moreover, as the number of cloud services in use across organizations increases, more sensitive data is being stored in the cloud, and companies continue to lack visibility and/or control over their cloud activities, cloud security is only becoming more critical with time.

However, to build security solutions that solve for these challenges and others, cloud-native security vendors need to first understand the exact nature of the issues their customers are facing. One way they typically approach this is by being deeply integrated into the market and relying on customer feedback to shape their product offerings. But there’s another, often-overlooked way for these companies to stay close to customers’ changing needs: fostering an internal cloud-centric culture themselves. By practicing what they preach, cloud vendors can best support customers and optimize their solutions.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.