A clean bill of health: Harnessing data for precision healthcare


Unlike other industries, UK healthcare isn’t defined by how much revenue can be generated. Instead, success is measured in terms of achieving positive health outcomes for patients.
With new healthcare data available from a variety of sources -- such as wearables, clinical trials and biometric sensors -- healthcare is now driven as much by the promise of data processing and advanced analytics as it is by developing new and specialized drugs. So, how can healthcare professionals move faster, and gain actionable insights from the huge volumes of data they collect?
Get 'Cloud Auditing Best Practices' (worth $35.99) for FREE


As more and more companies are moving to cloud and multi-cloud environments, being able to assess the compliance of these environments properly is becoming more important.
But in this fast-moving domain, getting the most up-to-date information is a challenge -- so where do you turn? Cloud Auditing Best Practices has all the information you’ll need. With an explanation of the fundamental concepts and hands-on walk-throughs of the three big cloud players, this book will get you up to speed with cloud auditing before you know it.
Adapting to a changing cybersecurity landscape [Q&A]


The past few years have seen some major changes in the IT world. Accelerated by the pandemic we've seen a significant shift to the cloud and hybrid working models.
But this brings with it additional risks. We spoke to Matt Spitz, head of engineering at Vanta, to discuss the security challenges posed and how enterprises can adapt to cope with them.
SSH is the service most targeted by cloud attackers


A new cloud threat findings report from Cado Security looks at the evolving cloud threat landscape, shedding light on the heightened risk of cyberattacks due to the rapid adoption of cloud-focused services.
The report shows SSH is the most commonly targeted service accounting for 68.2 percent of the samples seen, followed by Redis at 27.6 percent, and Log4Shell traffic at a mere 4.3 percent, indicating a shift in threat actor strategy no longer prioritizing the vulnerability as a means of initial access.
Over half of Azure and Google Cloud deployments fail CIS benchmarks


Cloud misconfiguration is a critical issue as it amplifies the risk of data breaches and unauthorized access. But new research from Qualys shows that many cloud deployments on major platforms are failing Center for Internet Security (CIS) benchmarks.
The report finds that on average, 50 percent of CIS Benchmarks are failing across the major providers. The average fail rate for each provider is 34 percent for AWS, 57 percent for Azure, and 60 percent for Google Cloud Platform (GCP).
Getting on top of spiraling cloud costs


Cloud computing has revolutionized the way organizations operate, enabling scalability and helping businesses remain agile in ever-changing landscapes. However, what may have originally been touted as a cost-saving solution has become increasingly difficult to manage.
Hyperscaler cloud services have the potential to offer huge cost savings due to their economies of scale. However, these savings may not always be passed down to customers. Moreover, the opaque pricing models of the larger service providers make the accurate estimation of costs difficult. The ease of provisioning resources in the cloud can also lead to significant overspending if not properly managed. Yet there are a variety of methods that can help cloud users better manage their increasing costs. Through the correct management, users can both reduce their cloud spend and better anticipate their monthly bill.
Get 'Windows 365 for Dummies' (worth $16) for FREE


Microsoft’s newest cloud-based operating system allows you to access your PC from any device. Windows 365 For Dummies teaches you the ins and outs of this game-changing OS.
You’ll learn how to make the most of Windows 365 -- get your work done, share documents and data, monitor storage space, and do it all with increased security. Oh, and did we mention you can do it from literally anywhere?
Generative AI assistant helps secure the cloud


Cloud security company Sysdig is launching a new generative AI assistant specifically designed to help with cloud security.
Whereas standard AI chatbots are designed to answer a specific question using a single large language model (LLM) and stateless analysis, Sysdig Sage uses a unique human-to-AI controller that mediates user interactions with LLMs to provide more advanced, tailored recommendations.
New Azure offerings help speed cloud migration


The cloud offers many benefits including scalability, cost savings, and flexibility, but the migration process isn't always an easy one.
Today at Microsoft Inspire the company is launching two new offerings aimed at making it easier for enterprises to migrate to Azure.
Why SOCs need urgent modernization [Q&A]


Security Operations Centers (SOCs) aim to detect, investigate, remediate, and restore organizational systems to a fully functional, secure state, whether it's defending against insider threats, data exfiltration attempts, or malware attacks.
However, examining the daily issues faced by many SOCs reveals a concerning array of challenges that place increasing pressure on the work of SOCs and the dedicated professionals who manage them.
More than half of enterprises overwhelmed by data


Today's typical large organization is holding 35 petabytes of data across its systems and this is expected to double by 2025. But 75 percent of IT leaders are concerned that their current infrastructure won't be able to scale to meet this demand.
A new report, from infrastructure specialist Hitachi Vantara, shows that while technologies like generative AI are spurring a goldrush to greater insights, automation, and predictability, they are simultaneously putting pressure on the already-strained infrastructure and hybrid cloud environments on which they run.
Only two percent of organizations feel confident in their cybersecurity strategies


While 75 percent of organizations have made significant strides to upgrade their infrastructure in the past year and 78 percent have increased their security budgets, only two percent of industry experts are confident in their security strategies, according to a new report.
The study, from critical infrastructure protection specialist OPSWAT, also finds most organizations have embraced public cloud hosting for their web applications, with an overwhelming 97 percent already employing or planning to implement containerization.
Microsoft announces the general availability of its dev-focused, cloud-based Microsoft Dev Box


First detailed last year, Microsoft Dev Box is now finally generally available. This is Microsoft's "ready-to-code, cloud-based workstation optimized for developer use cases and productivity" and it comes from years of development building on Visual Studio Codespaces.
These preconfigured, container- and Linux-based dev environments served their purposes in 2019, but the demands of developers forced Microsoft to push things further. The result is Microsoft Dev Box, combining developer-optimized capabilities with the enterprise-ready management of Windows 365 and Microsoft Intune.
Memory-based attacks increase as attackers dodge cloud defenses


A new report shows a 1,400 percent increase in fileless or memory-based attacks, which exploit existing software, applications, and protocols to perform malicious activities against cloud-based systems.
The research from Aqua Security's Nautilus research team collected honeypot data over a six-month period and shows that more than 50 percent of the attacks focused on defense evasion.
Dropbox introduces new AI-powered productivity features


Cloud storage provider Dropbox is launching two new AI-powered productivity tools -- though they're not available to everyone just yet.
Dropbox Dash is a universal search that connects all of your tools, content, and apps in a single search bar to help you easily find what you need. There's also Dropbox AI, a new feature that lets customers quickly summarize and get information from their Dropbox files.
Recent Headlines
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.