Articles about Cloud

Why and how organizations are modernizing their container deployments at the edge [Q&A]

Edge computing is aimed at bringing computing power closer to the source of data, such as IoT devices. It's increasingly being seen as an alternative to traditional data center and cloud models.

Stewart McGrath is the CEO at Section, a global Edge as a Service (EaaS) provider that helps organizations improve availability of their containerized application workloads in the cloud. We spoke to him to find out how and why companies are moving applications out to the edge.

Continue reading

The power of cloud-based quality management

Cloud

Manufacturing has a history of moving at a glacial pace when adopting new technology such as cloud-based solutions, but cloud is not new anymore. In recent years, cloud computing and SaaS (Software-as-a-Service) have begun to dominate. More and more manufacturers are looking to switch their quality management to a cloud-based quality system.

Simply, in today’s ever-changing and volatile manufacturing climate, the cost advantages, power, and versatility of the cloud have become essential to survival.

Continue reading

Meeting the challenges of multicloud [Q&A]

Cloud

Businesses have been using the cloud for many years, but only in more recent times have we seen the rise of multicloud as companies seek to spread their public cloud workload.

Why has multicloud become such a popular strategy and what challenges does it present? We talked to Pavel Despot, senior product manager at Akamai, to find out.

Continue reading

Over half of organizations suffer cyberattacks in the cloud

Cloud fail

A new report reveals that 53 percent of organizations have experienced a cyberattack on their cloud infrastructure within the last 12 months.

The 2022 Cloud Security Report from Netwrix shows that was the most common type of attack, experienced by 73 percent of respondents.

Continue reading

Cloud security remains a top concern

cloud padlock

A new survey of cybersecurity professionals attending this week's RSA conference shows that cloud security is their main concern.

The study by Delinea shows 37 percent think cloud security is the main cybersecurity concern of the year, followed by ransomware (19 percent) and remote workers (17 percent).

Continue reading

Digital transformation, security and cloud drive enterprise IT spending

Enterprise IT spending is continuing to increase, with 64 percent of respondents to a new study expecting to increase IT budgets in the next 12 months. This is up from 49 percent in January of 2021, though down from 71 percent before sanctions against Russia began in February.

The latest Flexera 2022 Tech Spend Pulse report -- based on a survey of 501 IT executives working in large enterprises with 2,000 or more employees, headquartered in North America and Europe -- shows organizations with 2,001 to 5,000 employees spend 10 percent of revenue on IT. For the largest companies (more than 10,000 employees), this drops to six percent.

Continue reading

Enterprises keen to ensure digital resilience

endpoint protection

Achieving digital resilience is a prominent concern for enterprise organizations, as they face increasingly sophisticated cyberthreats and adjust to a hybrid working environment.

A new report from A10 Networks, based on a survey of almost 2,500 network infrastructure, security, and cloud migration decision makers in larger businesses worldwide, shows nine out of 10 respondents have some level of concern around digital resilience.

Continue reading

Cloud data breaches rise as adoption and complexity increase

Cloud maze complexity

According to a new report, 45 percent of businesses have experienced a cloud-based data breach or failed audit in the past 12 months, up five percent from the previous year.

The latest Cloud Security Report from Thales also shows multi-cloud adoption is accelerating with 72 percent of organizations using multiple IaaS providers compared to 57 percent in 2021.

Continue reading

The technology turning point: Five key tech trends that will define the next decade

The central theme of this year’s World Economic Forum is how history is at a 'turning point', based on the era-defining impact of the COVID-19 pandemic. This moment is not just a turning point in history, but also for technology: businesses and society are in the midst of a digital revolution. 

To underline just how much change is afoot, Gartner says worldwide IT spending will increase 5 percent this year, hitting $4.5 trillion. With so much going on, it can be hard to focus on what the key technology developments are, meaning there is a risk of spreading yourself too thinly. To help cut through the noise and prioritize the biggest technology trends, here are five key technology trends that look set to define the next decade, and beyond. 

Continue reading

Five steps to a secure cloud architecture

Cloud data security

Policy as code is central to establishing and maintaining secure cloud architecture by enabling security teams to impart their knowledge across the organization in a common, machine-readable language.

Cloud computing cyberattacks don’t play out like the scenes from Hollywood thrillers. No one is slowly lowering Tom Cruise into a preselected target’s secure data center equipped with ultrasensitive noise, temperature and motion detectors so he can steal a specific file.

Continue reading

Enterprises overspend by millions on cloud services

New research reveals enterprises are over-spending on cloud services by up to $8.5 million, as IT leaders grow frustrated with poor management tools, vendor-lock in and issues with accessing data.

A study from Couchbase of IT decision makers at enterprises with more than 1,000 staff finds a typical annual spend on cloud services to now stand at $33 million. However, functions that are not currently meeting businesses expectations account for over 35 percent of the total cost.

Continue reading

APIs and cloud apps are greatest threats to enterprise security readiness

Intelligent APIs

A survey of over 400 CISOs finds they are are grappling with a wide range of risks and challenges, especially linked to accelerating utilization of technologies like cloud-based applications and the use of Application Programming Interfaces (APIs).

The study from CISOs Connect, an invitation-only community of cyber experts and part of Security Current, finds the IT components rated as most needing improvement are: APIs (42 percent), cloud applications (SaaS) (41 percent), and cloud infrastructure (IaaS) (38 percent).

Continue reading

Microsoft Entra is a new identity and access-focused family of products

Microsoft Entra

Microsoft has launched a new family of products called Entra. Microsoft Entra encompasses a number of identity and access management solutions including the existing Azure AD. The launch comes after the acquisition of CloudKnox Security last year, and is Microsoft's attempt to help boost security across multicloud environments -- or "secure access for a connected world".

Bolstering the product family, the company has also launched cloud permission management tool Microsoft Entra Permissions Management​, and Microsoft Entra Verified ID​ -- a system that allows for more secure interactions, based on decentralized identity standards. Microsoft has also announced public previews of Workload Identities​ and Lifecycle Workflows.

Continue reading

Broadcom to acquire VMware for $61 billion

Broadcom

Broadcom has struck a deal with VMware that will see the chipmaker buying the cloud and virtualization software firm for around $61 billion in cash and stock. As part of the acquisition, Broadcom will also take on $8 billion of VMware's net debt.

When the deal is complete, Broadcom Software Group will rebrand and operate as VMware. As part of Broadcom, the new VMware will, the company says, "offer enterprise customers greater choice and flexibility to address the most complex IT infrastructure challenges".

Continue reading

Business-critical systems going unsecured and unmonitored

endpoint security

According to a new poll 40 percent of enterprises don't include business-critical systems such as SAP in their cybersecurity monitoring. In addition, a further 27 percent are unsure if systems are included in their cybersecurity monitoring at all.

The survey from Logpoint also shows only 23 percent say the process of reviewing SAP logs for cybersecurity events or cyberthreat activity is automated through SIEM, with almost 19 percent still doing so manually.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.