There’s no doubt about it, we are living in a cloud enhanced world. No matter what is happening in life, whether it’s uploading pictures of the family, keeping track of friends on social media, or working remotely, the fact remains that the cloud is a part of our everyday lives in one way or another.
So why are organizations so hesitant to adopt a cloud infrastructure? From speaking with customers, the reason extends across infrastructure, business as well as, let’s face it, an overall new way of thinking about what is the best way to mitigate risk.
The Linux Foundation is today announcing the formation of the FinOps Foundation to promote the discipline of cloud financial management through best practices, education, and standards
With support from founding members Apptio, Cloudeasier, Cloudsoft, CloudWize, Contino, Kubecost, Neos, Opsani, ProsperOps, Timspirit and VMware, the foundation is set to increase awareness and offer education for professionals in the emerging discipline of FinOps.
While COVID-19 has altered the cloud strategies of enterprise IT executives, the vast majority are still moving forward with their big-picture digital transformation initiatives, and most think they'll see an increase in their cloud budgets to support these projects over the next year.
A new report from professional services and managed cloud company 2nd Watch surveyed more than 100 cloud-focused IT directors or above and finds that 82 percent of respondents say they've experienced cloud-related challenges with 77 percent saying these challenges have caused them to alter their cloud strategies.
The security of public clouds continues to be a major challenge, with 75 percent of respondents to a new survey saying they are 'very' or 'extremely' concerned about it.
The study from Check Point and Cybersecurity Insiders shows 68 percent say their organizations used two or more different public cloud providers, which means that security teams often have to use multiple security tools and management consoles to try to enforce security and compliance across the different environments.
There's been a huge shift to remote working this year, but new data shows that there has also been a 161 percent increase in visits to high-risk apps and websites as personal use of managed devices has nearly doubled.
The study from cloud security company Netskope finds that 64 percent of workers are now remote. Along with this increase in remote work has come an 80 percent increase in the use of collaboration apps as remote workers seek to remain connected with their colleagues
We've already seen how lockdowns have been affecting internet speeds around the world, but what other impact has the pandemic been having on the web?
A new Internet Performance Report from ThousandEyes looks at the availability and performance of internet-related networks, including those of Internet Service Providers (ISPs), public cloud, Content Delivery Network (CDN) and Domain Name System (DNS) providers.
Digital transformation combined with a shift to more remote working has presented considerable challenges for enterprises when it comes to securing their systems.
One of the technologies being increasingly used to enable remote access is Secure Access Services Edge (SASE). We spoke to Anurag Kahol, CTO and co-founder of cloud security company Bitglass to find out more about SASE and how it can help businesses deliver their transformation projects.
As more organizations move their operations to the cloud and networks become more fragmented, ensuring safe, secure access to systems becomes more difficult.
Secure access specialist Pulse Secure is launching a new Pulse Zero Trust Access (PZTA) solution. A cloud-based, multi-tenant secure access platform that enables organizations to provide users with easy, anywhere access to multi-cloud and data center applications.
Secure Access Service Edge (SASE) technology is increasingly being used to enable secure and fast cloud adoption, helping ensure both users and devices have safe cloud access to applications, data and services from anywhere.
Cybersecurity company Forcepoint is entering this market with a new suite of SASE solutions, including a Cloud Security Gateway and zero trust Private Access features.
Faced with an ever changing landscape, skills shortages and budget constraints, IT departments are increasingly seeking to automate repetitive tasks.
Automation specialist BitTitan is looking to capitalize on this with the launch of an IT toolbox designed to centralize and automate IT tasks for more effective management of resources, security and data governance.
There is an old saying that there are no perfect solutions, only trade-offs. We have all experienced this trade-off situation in our lives at some point, when we must make a decision knowing that there is no perfect solution available and that we will be forced to compromise in some way.
This is one of the reasons why some people choose to put money in the stock market, they’re prepared to take a risk, while some people prefer to put money in savings accounts, where the payback is more predictable. The trade-off in this example is that you cannot put the same money in both places at the same time. You need to make your decision based on the existing trade-off of higher risk and return (stocks) or lower risk and return (savings account).
Organizations often rush into cloud deployments without fully appreciating all of the risks that they can present.
A new report from cybersecurity advisory and assessment services firm Coalfire identifies key considerations, common pitfalls, and practical advice for professionals who have responsibility for enterprise cloud strategy, planning, adoption, and operations.
Using complex cloud applications built with microservices and APIs can often expose business logic that threat actors use to infiltrate applications and private data.
A new application security company Traceable is launching today with a platform that traces end-to-end application activity from the user and session all the way through the application code. Traceable's TraceAI machine learning and distributed tracing technology analyzes data to learn normal application behavior and detect any activity that deviates from the norm.
While OneDrive is primarily used for cloud file storage, it also includes a handy feature that lets you remotely access any of the files stored on your PC. Or at least this is the case for the next couple of weeks.
When the end of July rolls around, Microsoft is killing off the ability to "fetch files" from a connected computer. Instead, users will have to explicitly specify which files and folders they want to synchronize and be able to access.
As companies accelerate their digital transformation programs, many move data into the cloud without all the security controls necessary to protect both their organization and customers’ data. This leaves them vulnerable to cyberattacks and without evidence of compliance with data protection regulations
Cybersecurity specialist Imperva is launching a new SaaS Cloud Data Security product that gives businesses visibility and compliance oversight for data hosted in a database-as-a-service (DbaaS).