New solution offers cheaper enterprise-grade cloud storage
A new enterprise-grade, native cloud storage solution aims to deliver increased speed, affordability and security thanks to its use of decentralized Web3 technology.
Impossible Cloud supports almost unlimited capacity, and its Object Storage solution offers a scalable, cost-efficient alternative for organizations that require reliable and secure storage.
Why have cloud when you can have supercloud? [Q&A]
There's been a lot of talk about 'supercloud' recently, but what exactly does it mean? And is it the next big thing that's set to disrupt the technology landscape?
We talked to Amir Khan, CEO and co-founder of Alkira, to find out more about supercloud and what it means for the industry.
Strong data protection can deliver economic benefits for enterprises
As enterprises move to cloud and hybrid models they face a range of new challenges in protecting their data.
A new study from Enterprise Strategy Group (ESG), released by Commvault and Microsoft, finds that 53 percent of respondents say their IT environment was more complex than it was two years ago.
Vulnerable cloud attack surface grows almost 600 percent
A new report from cyber asset visibility and management company JupiterOne shows numbers of enterprise cyber assets have increased by 133 percent year-on-year, from an average of 165,000 in 2022 to 393,419 in 2023.
Organizations have also seen the number of security vulnerabilities, or unresolved findings, increase by 589 percent according to the report which analyzed more than 291 million assets, findings, and policies to establish the current state of enterprise cloud assets, including cloud and physical environments of devices, networks, apps, data, and users.
Free tool finds sensitive data stored in Google Drive accounts
As cloud and SaaS use grows a major challenge for IT, security and compliance teams is the lack of visibility into their organization's SaaS ecosystem.
Metomic is launching a new, free cybersecurity tool that scans Google Drive accounts to find sensitive data and information lurking in Google Docs and files. After entering a Gmail address and password, Google Drive Risk Report will scan the Google Drive connected to the address and, in a matter of seconds, generate a report.
Data mobility -- why it's a must and how to achieve it [Q&A]
Data is still essential for enterprises, but the rise of hybrid working and the adoption of multi-cloud environments has made data mobility and migration a hot topic.
We spoke to Mark Greenlaw, VP of product strategy for Cirrus Data, to discuss data mobility, what's driving it and how organizations need to adapt.
A small number of exposures can put 90 percent of critical assets at risk
New research reveals that a small volume of security exposures can put more than 90 percent of an organization's critical assets at risk of compromise.
The analysis of more than 60 million exposures in over 10 million entities from XMCyber, in collaboration with the Cyentia Institute, finds just two percent of security exposures can actually lead to critical assets and most exposures (75 percent) along attack paths lead to 'dead ends'.
Outlook users face email issues as Microsoft starts using OneDrive cloud storage space for email attachments
If you are having trouble sending and receiving email via your Outlook.com account, you are not alone. Problems have started to surface following a recent policy change by Microsoft that means email attachments now eat into OneDrive storage limits -- as we reported previously.
Microsoft started to roll out the change at the beginning of February, but it seems that the pace of the rollout has increased as more and more users are hitting their storage limits and experiencing problems with their emails.
Cloud spending has become a critical performance indicator for data teams
Cloud spending is now a critical KPI for the majority of data teams, according to a new report. Almost 80 percent of business stakeholders say cloud spending is a critical KPI while 55 percent of data practitioners say the same.
The study, from data observability platform Unravel Data, surveyed 350 data professionals at the Data Teams Summit event earlier this year and shows that in addition to cloud spending being elevated as a top KPI, 44 percent report that they believe that they are leaving money on the table when it comes to their public cloud utilization.
Businesses waste $17 million a year on unused SaaS apps
A new report from enterprise SaaS management firm Zylo finds that on average, 44 percent of businesses' SaaS licenses are wasted or underutilized, and the average organization wastes $17M in unused SaaS licenses every year.
Enterprise organizations (those with 10,000 employees or more) spend over $224M annually on SaaS but only utilize 50 percent of their SaaS licenses
Shadow data is a top concern for security teams
Shadow data is named as the number one concern around protecting cloud data by 68 percent of data security professionals.
A new study from Laminar reveals that the number of respondents expressing concern over shadow data has increased to 93 percent compared to 82 percent the year before.
Agent-based vs. agentless approaches -- how to implement cloud security
Implementing your security approach will depend on how you can translate your approach from strategy into reality. As part of this, you will have to make decisions on what tools you use based on the functions that they cover, how they help you create and use data, and how they work. This latter part is important as all security professionals have their own preferences. One of the big debates here is whether you use agent-based or agentless tools.
Using security tools that rely on agents can be an issue for some security professionals, while others will swear by their agent-based tool of choice, and you would have to pry it from their hands. The challenge here is when you have a combination of complex environments to consider, faster software development goals to support, real-time security pressures to contend with, and more data than you know what to do with. So what approach should you choose?
Get 'Cloud Native Security' (worth $24) for FREE
Cloud Native Security delivers a detailed study into minimizing the attack surfaces found on today's Cloud Native infrastructure.
Throughout the work, hands-on examples walk through mitigating threats and the areas of concern that need to be addressed. The book contains the information that professionals need in order to build a diverse mix of the niche knowledge required to harden Cloud Native estates.
75 percent of SaaS applications pose a risk to enterprises
The past few years have seen massive growth in the number of SaaS applications used by enterprises, but new research from Spin AI shows that 75 percent of SaaS applications pose a high or medium risk to data stored in either Google Workspace or Microsoft 365.
On average, 35 percent of apps with OAuth permissions to Google Workspace or Microsoft 365 are classified as high risk. For large organizations (with more than 2,000 employees) 56.91 percent of apps pose a high risk.
Data management gets more complex as IT infrastructure diversifies
IT infrastructure is increasingly diverse, with organizations struggling to integrate data management and control.
The latest Enterprise Cloud Index from Nutanix shows the majority of IT teams (60 percent) use more than one IT infrastructure -- a trend that's expected to intensify in the future -- but struggle with visibility of data across environments.
Recent Headlines
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.