Articles about Cloud

Data mobility -- why it's a must and how to achieve it [Q&A]

Data is still essential for enterprises, but the rise of hybrid working and the adoption of multi-cloud environments has made data mobility and migration a hot topic.

We spoke to Mark Greenlaw, VP of product strategy for Cirrus Data, to discuss data mobility, what's driving it and how organizations need to adapt.

Continue reading

A small number of exposures can put 90 percent of critical assets at risk

risk jigsaw piece

New research reveals that a small volume of security exposures can put more than 90 percent of an organization's critical assets at risk of compromise.

The analysis of more than 60 million exposures in over 10 million entities from XMCyber, in collaboration with the Cyentia Institute, finds just two percent of security exposures can actually lead to critical assets and most exposures (75 percent) along attack paths lead to 'dead ends'.

Continue reading

Outlook users face email issues as Microsoft starts using OneDrive cloud storage space for email attachments

OneDrive logo with mobile in foreground

If you are having trouble sending and receiving email via your Outlook.com account, you are not alone. Problems have started to surface following a recent policy change by Microsoft that means email attachments now eat into OneDrive storage limits -- as we reported previously.

Microsoft started to roll out the change at the beginning of February, but it seems that the pace of the rollout has increased as more and more users are hitting their storage limits and experiencing problems with their emails.

Continue reading

Cloud spending has become a critical performance indicator for data teams

Cloud dollars

Cloud spending is now a critical KPI for the majority of data teams, according to a new report. Almost 80 percent of business stakeholders say cloud spending is a critical KPI while 55 percent of data practitioners say the same.

The study, from data observability platform Unravel Data, surveyed 350 data professionals at the Data Teams Summit event earlier this year and shows that in addition to cloud spending being elevated as a top KPI, 44 percent report that they believe that they are leaving money on the table when it comes to their public cloud utilization.

Continue reading

Businesses waste $17 million a year on unused SaaS apps

A new report from enterprise SaaS management firm Zylo finds that on average, 44 percent of businesses' SaaS licenses are wasted or underutilized, and the average organization wastes $17M in unused SaaS licenses every year.

Enterprise organizations (those with 10,000 employees or more) spend over $224M annually on SaaS but only utilize 50 percent of their SaaS licenses

Continue reading

Shadow data is a top concern for security teams

Shadow data is named as the number one concern around protecting cloud data by 68 percent of data security professionals.

A new study from Laminar reveals that the number of respondents expressing concern over shadow data has increased to 93 percent compared to 82 percent the year before.

Continue reading

Agent-based vs. agentless approaches -- how to implement cloud security

Cloud security

Implementing your security approach will depend on how you can translate your approach from strategy into reality. As part of this, you will have to make decisions on what tools you use based on the functions that they cover, how they help you create and use data, and how they work. This latter part is important as all security professionals have their own preferences. One of the big debates here is whether you use agent-based or agentless tools.

Using security tools that rely on agents can be an issue for some security professionals, while others will swear by their agent-based tool of choice, and you would have to pry it from their hands. The challenge here is when you have a combination of complex environments to consider, faster software development goals to support, real-time security pressures to contend with, and more data than you know what to do with. So what approach should you choose?

Continue reading

Get 'Cloud Native Security' (worth $24) for FREE

Cloud Native Security delivers a detailed study into minimizing the attack surfaces found on today's Cloud Native infrastructure.

Throughout the work, hands-on examples walk through mitigating threats and the areas of concern that need to be addressed. The book contains the information that professionals need in order to build a diverse mix of the niche knowledge required to harden Cloud Native estates.

Continue reading

75 percent of SaaS applications pose a risk to enterprises

Risk dial

The past few years have seen massive growth in the number of SaaS applications used by enterprises, but new research from Spin AI shows that 75 percent of SaaS applications pose a high or medium risk to data stored in either Google Workspace or Microsoft 365.

On average, 35 percent of apps with OAuth permissions to Google Workspace or Microsoft 365 are classified as high risk. For large organizations (with more than 2,000 employees) 56.91 percent of apps pose a high risk.

Continue reading

Data management gets more complex as IT infrastructure diversifies

Cloud maze complexity

IT infrastructure is increasingly diverse, with organizations struggling to integrate data management and control.

The latest Enterprise Cloud Index from Nutanix shows the majority of IT teams (60 percent) use more than one IT infrastructure -- a trend that's expected to intensify in the future -- but struggle with visibility of data across environments.

Continue reading

Microsoft has hidden Cloud PC references in Windows 11 as a hint of future Windows 12 features

White cloud in a pink sky

The Windows Insider program is one of the best places to gain access to the latest features and options, but there are sometimes some hidden gems that serves as signposts of what's to come. The latest Dev build is a good case in point.

References were spotted in Windows 11 build 23419 to Cloud PC thanks to the arrival of the settingshandlers_cloudpc.dll file. There are even entries in Settings that make it clear that Microsoft is betting big on Cloud PC, but it remains to be seen whether this ends up in Windows 11 or Windows 12.

Continue reading

CISA releases open source Untitled Goose Tool to detect malicious activity in Azure, Azure Active Directory and Microsoft 365 environments

CISA logo and goose

The CISA has launched a new security tool designed to help protect various Microsoft cloud services. The open source Untitled Goose Tool is available for both Windows and macOS.

The utility was developed by the US Cybersecurity & Infrastructure Security Agency in conjunction with Sandia National Laboratories. The aim of the tool is to help to detect and respond to malicious activity in Microsoft Azure, Azure Active Directory (AAD) and Microsoft 365 (M365) environments.

Continue reading

New solution helps enterprises manage cloud assets

Cloud

As organizations turn increasingly to the cloud they face the challenge of understanding not just the cost but also the value of their operation.

To help organizations maximize business value from their technology investments, Flexera is launching a new solution that strengthens an enterprise's FinOps and cloud central teams, while allowing the convergence of IT asset management (ITAM) and FinOps.

Continue reading

IT in 2023: Security, cloud and more

Cloud data protection

Given the ever-changing trends in cloud computing, security, and more, it can be difficult to plan for the road ahead. However, anticipating new developments, both within your organization and the wider industry, is vital if you want to stay prepared and maximize ROI. 

Data is one of a business’ greatest assets, and its role, size and value is only going to increase in 2023 and beyond. Cybersecurity Ventures suggests total global data storage is expected to exceed 200 zettabytes by 2025, with a ransomware attack precited to impact a business, consumer or device every two seconds by 2031, properly securing your data is paramount.

Continue reading

New solution helps to visualize cloud-native app risks

With more and more organizations turning to the cloud and cloud-native application development, AppSec teams face a mounting challenge to keep pace with their development counterparts.

To address this, Backslash Security is launching a new solution to provide unified code and cloud-native security by correlating cloud context to code risk, backed by automated threat modeling, code risk prioritization, and simplified remediation across applications and teams.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.