Articles about Cloud

New tool makes it easier to manage machine identities

code software developer development

Thanks to increased cloud and container use there's a growing demand for machine identities, but delivering and managing those identities can present problems.

Machine ID specialist Venafi is launching a new tool called Firefly that enables security teams to easily and securely meet developer-driven machine identity management requirements for cloud native workloads by issuing machine identities, such as TLS and SPIFFE, locally and quickly across any environment.

Continue reading

What if cloud data was stored on floppy disks?

Floppy disk box

In 2020 alone, 61 percent of businesses migrated their workloads to the cloud, with 48 percent actively choosing to store their most important data in the cloud.

But because cloud storage is out of sight it can sometimes be difficult to understand just how much data there is stored out there.

Continue reading

Enterprises plan to increase cloud service investment as part of network transformation

Cloud money

In a drive for network transformation, 98 percent of enterprise IT leaders say they plan to increase their dependence and investment in cloud services.

The latest Enterprise Network Transformation report from SASE solutions company Aryaka finds that although an uncertain economy is impacting network and security team investments CIOs, CISOs and IT leaders are doubling down on investment in the cloud.

Continue reading

New solution offers cheaper enterprise-grade cloud storage

Cloud

A new enterprise-grade, native cloud storage solution aims to deliver increased speed, affordability and security thanks to its use of decentralized Web3 technology.

Impossible Cloud supports almost unlimited capacity, and its Object Storage solution offers a scalable, cost-efficient alternative for organizations that require reliable and secure storage.

Continue reading

Why have cloud when you can have supercloud? [Q&A]

Cloud staircase light supercloud

There's been a lot of talk about 'supercloud' recently, but what exactly does it mean? And is it the next big thing that's set to disrupt the technology landscape?

We talked to Amir Khan, CEO and co-founder of Alkira, to find out more about supercloud and what it means for the industry.

Continue reading

Strong data protection can deliver economic benefits for enterprises

data protection

As enterprises move to cloud and hybrid models they face a range of new challenges in protecting their data.

A new study from Enterprise Strategy Group (ESG), released by Commvault and Microsoft, finds that 53 percent of respondents say their IT environment was more complex than it was two years ago.

Continue reading

Vulnerable cloud attack surface grows almost 600 percent

Weather cloud

A new report from cyber asset visibility and management company JupiterOne shows numbers of enterprise cyber assets have increased by 133 percent year-on-year, from an average of 165,000 in 2022 to 393,419 in 2023.

Organizations have also seen the number of security vulnerabilities, or unresolved findings, increase by 589 percent according to the report which analyzed more than 291 million assets, findings, and policies to establish the current state of enterprise cloud assets, including cloud and physical environments of devices, networks, apps, data, and users.

Continue reading

Free tool finds sensitive data stored in Google Drive accounts

software scanning

As cloud and SaaS use grows a major challenge for IT, security and compliance teams is the lack of visibility into their organization's SaaS ecosystem.

Metomic is launching a new, free cybersecurity tool that scans Google Drive accounts to find sensitive data and information lurking in Google Docs and files. After entering a Gmail address and password, Google Drive Risk Report will scan the Google Drive connected to the address and, in a matter of seconds, generate a report.

Continue reading

Data mobility -- why it's a must and how to achieve it [Q&A]

Businessman working with a Cloud Computing diagram

Data is still essential for enterprises, but the rise of hybrid working and the adoption of multi-cloud environments has made data mobility and migration a hot topic.

We spoke to Mark Greenlaw, VP of product strategy for Cirrus Data, to discuss data mobility, what's driving it and how organizations need to adapt.

Continue reading

A small number of exposures can put 90 percent of critical assets at risk

risk jigsaw piece

New research reveals that a small volume of security exposures can put more than 90 percent of an organization's critical assets at risk of compromise.

The analysis of more than 60 million exposures in over 10 million entities from XMCyber, in collaboration with the Cyentia Institute, finds just two percent of security exposures can actually lead to critical assets and most exposures (75 percent) along attack paths lead to 'dead ends'.

Continue reading

Outlook users face email issues as Microsoft starts using OneDrive cloud storage space for email attachments

OneDrive logo with mobile in foreground

If you are having trouble sending and receiving email via your Outlook.com account, you are not alone. Problems have started to surface following a recent policy change by Microsoft that means email attachments now eat into OneDrive storage limits -- as we reported previously.

Microsoft started to roll out the change at the beginning of February, but it seems that the pace of the rollout has increased as more and more users are hitting their storage limits and experiencing problems with their emails.

Continue reading

Cloud spending has become a critical performance indicator for data teams

Cloud dollars

Cloud spending is now a critical KPI for the majority of data teams, according to a new report. Almost 80 percent of business stakeholders say cloud spending is a critical KPI while 55 percent of data practitioners say the same.

The study, from data observability platform Unravel Data, surveyed 350 data professionals at the Data Teams Summit event earlier this year and shows that in addition to cloud spending being elevated as a top KPI, 44 percent report that they believe that they are leaving money on the table when it comes to their public cloud utilization.

Continue reading

Businesses waste $17 million a year on unused SaaS apps

Money drain plughole

A new report from enterprise SaaS management firm Zylo finds that on average, 44 percent of businesses' SaaS licenses are wasted or underutilized, and the average organization wastes $17M in unused SaaS licenses every year.

Enterprise organizations (those with 10,000 employees or more) spend over $224M annually on SaaS but only utilize 50 percent of their SaaS licenses

Continue reading

Shadow data is a top concern for security teams

Young lady casting shadow of machine code

Shadow data is named as the number one concern around protecting cloud data by 68 percent of data security professionals.

A new study from Laminar reveals that the number of respondents expressing concern over shadow data has increased to 93 percent compared to 82 percent the year before.

Continue reading

Agent-based vs. agentless approaches -- how to implement cloud security

Cloud security

Implementing your security approach will depend on how you can translate your approach from strategy into reality. As part of this, you will have to make decisions on what tools you use based on the functions that they cover, how they help you create and use data, and how they work. This latter part is important as all security professionals have their own preferences. One of the big debates here is whether you use agent-based or agentless tools.

Using security tools that rely on agents can be an issue for some security professionals, while others will swear by their agent-based tool of choice, and you would have to pry it from their hands. The challenge here is when you have a combination of complex environments to consider, faster software development goals to support, real-time security pressures to contend with, and more data than you know what to do with. So what approach should you choose?

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.