Multi-cloud environments tend to be harder to secure because teams and applications are much more distributed resulting in a larger attack surface.
A zero-trust approach deals with these threats but can introduce overheads that make it hard to manage. Morpheus Data is integrating VMware NSX-T and Unisys Stealth technology into its cloud automation framework to enable microsegmentation and dramatically simplify the implementation of zero-trust processes.
Recent market data from Synergy Research Group via CRN suggests 2019 was a milestone for IT and that for the first time ever, enterprises are spending more money annually on cloud infrastructure services than on data center hardware and software. For example, total spend on cloud infrastructure services reached $97 billion, up 38 percent year over year, whereas total spend on data center hardware and software hit $93 billion in 2019, an increase of only 1 percent compared to 2018.
This means that many companies that have historically owned, maintained, and managed their own IT operations in their own data center are now evolving how they support their business operations by transforming their IT to cloud.
The Cloud is a $200 billion business that analyst firm IDC expects to nearly double in valuation by 2022. It enables collaborative productivity apps, on-demand entertainment, and promises much needed advances in telemedicine. But all this potential will come crashing to a halt unless we take seriously the corresponding rise of cloud-based cybersecurity threats. The increase we have seen in cyber-attacks seeking cloud-based data is worrisome and the potential for crippling the healthcare industry is high especially given the current global climate and their dependency on cloud-based services.
Recent warnings and actual attacks are a prominent example of the active and persistent threats to our global healthcare networks, economy, and connected infrastructure. Organizations involved in national and international COVID-19 responses are being actively targeted by hacking teams and threat groups. This is according to a recent alert from DHS ‘s Cybersecurity and Infrastructure Agency (CISA) Europe’s largest hospital. In addition, the Czech Republic warned of expected cyberattacks targeting healthcare systems designed to damage or destroy computers in critical healthcare infrastructure. And last month, Interpol announced that its Cybercrime Threat Response team had detected a significant increase in ransomware extortion schemes against healthcare organizations and infrastructures. The list goes on…
A new report finds that more than 88 percent of organizations use cloud infrastructure in one form or another, and 45 percent expect to move three quarters or more of their applications to the cloud over the next twelve months.
The study from O'Reilly surveyed 1,283 software engineers, technical leads, and decision-makers from around the globe and finds that 21 percent of organizations are hosting all their applications in a cloud context.
Email compromise via spoofed domains or compromised accounts is a major problem. But a new cloud platform from Abnormal Security tracks the reputations of an organization's vendors and customers, and improves detection accuracy of advanced social engineering attacks.
VendorBase is a global database that gives organizations the ability to see detailed views of all vendors, including profile information, the VendorBase risk assessment score, explanations on risk scores, a timeline view of relevant email communication and security activity for that vendor.
As organizations move more of their systems to the cloud, they need security solutions that maintain visibility while keeping them safe.
Cybersecurity company ESET is releasing an upgraded version of its Security Management Center for Microsoft Azure, aimed at providing complete, real-time network visibility.
While network scanners and agent-based security tools are commonplace, they come with significant operational costs, but still offer only partial visibility, leaving the organization vulnerable to breaches.
Orca Security has produced a patent pending SideScanning technology, which is based on reading the workloads' run time block storage out of band, and cross-referencing this with cloud context pulled directly from the cloud vendors' APIs.
Enterprises and their data are vulnerable, perhaps more so than ever right now, with COVID related phishing scams booming.
Backup specialist Clumio is adding Microsoft 365 to its secure backup as a service offering, providing organizations running Microsoft 365 with a globally consolidated data protection service.
The latest State of the Cloud report from Flexera reveals that 59 percent of enterprises expect their cloud usage to exceed prior plans due to COVID-19.
Organizations are over budget for cloud spending by an average of 23 percent, and expect cloud spend to increase by 47 percent next year. However, respondents estimate that 30 percent of their cloud spend gets wasted.
As businesses move to the cloud, they want choice, flexibility, and the ability to easily manage and migrate their critical workloads securely across public clouds, private clouds, and on-premise environments.
To help them achieve this IBM is enhancing the Red Hat OpenShift container platform on IBM Cloud by making OpenShift 4.3 generally available as part of its fully managed service.
We've seen many companies offering free software during the current crisis. Now security and risk analytics company Gurucul is launching two free services to help organizations protect themselves against cyberattacks that target their remote workers and third-party identities.
These deliver the Gurucul Unified Security and Risk Analytics platform as a cloud service with pre-configured and tuned algorithms that can detect unusual and high risk behavior patterns exhibited by remote workers as well as third party identities and devices.
Cloud servers, you might think, are big expensive pieces of kit. But you’d be wrong, at least where the Turing Pi project is concerned.
This mini ITX format board costing under $200 allows seven Raspberry Pi systems to be combined into a desktop Kubernetes cluster that's smaller than a sheet of A4 paper.
A new survey finds that 85 percent of companies believe embracing the public cloud is critical to fuel innovation. But of those who have already adopted public cloud, only 40 percent have in place an approach to managing cloud and container security.
The study by DivvyCloud finds only 58 percent say their organization has clear guidelines and policies in place for developers building applications and operating in the public cloud. Of those, 25 percent say these policies are not enforced, while 17 percent confirm their organization lacks clear guidelines entirely.
Ubuntu creator Canonical is launching a new Managed Apps platform, allowing enterprises to have their apps deployed and operated by Canonical as a fully managed service.
At launch the service will cover ten widely used cloud-native database and LMA (logging, monitoring and alerting) apps on multi-cloud Kubernetes but also on virtual machines across bare-metal, public and private cloud.