Articles about Cloud

The technology turning point: Five key tech trends that will define the next decade

The central theme of this year’s World Economic Forum is how history is at a 'turning point', based on the era-defining impact of the COVID-19 pandemic. This moment is not just a turning point in history, but also for technology: businesses and society are in the midst of a digital revolution. 

To underline just how much change is afoot, Gartner says worldwide IT spending will increase 5 percent this year, hitting $4.5 trillion. With so much going on, it can be hard to focus on what the key technology developments are, meaning there is a risk of spreading yourself too thinly. To help cut through the noise and prioritize the biggest technology trends, here are five key technology trends that look set to define the next decade, and beyond. 

Continue reading

Five steps to a secure cloud architecture

Cloud data security

Policy as code is central to establishing and maintaining secure cloud architecture by enabling security teams to impart their knowledge across the organization in a common, machine-readable language.

Cloud computing cyberattacks don’t play out like the scenes from Hollywood thrillers. No one is slowly lowering Tom Cruise into a preselected target’s secure data center equipped with ultrasensitive noise, temperature and motion detectors so he can steal a specific file.

Continue reading

Enterprises overspend by millions on cloud services

New research reveals enterprises are over-spending on cloud services by up to $8.5 million, as IT leaders grow frustrated with poor management tools, vendor-lock in and issues with accessing data.

A study from Couchbase of IT decision makers at enterprises with more than 1,000 staff finds a typical annual spend on cloud services to now stand at $33 million. However, functions that are not currently meeting businesses expectations account for over 35 percent of the total cost.

Continue reading

APIs and cloud apps are greatest threats to enterprise security readiness

Intelligent APIs

A survey of over 400 CISOs finds they are are grappling with a wide range of risks and challenges, especially linked to accelerating utilization of technologies like cloud-based applications and the use of Application Programming Interfaces (APIs).

The study from CISOs Connect, an invitation-only community of cyber experts and part of Security Current, finds the IT components rated as most needing improvement are: APIs (42 percent), cloud applications (SaaS) (41 percent), and cloud infrastructure (IaaS) (38 percent).

Continue reading

Microsoft Entra is a new identity and access-focused family of products

Microsoft Entra

Microsoft has launched a new family of products called Entra. Microsoft Entra encompasses a number of identity and access management solutions including the existing Azure AD. The launch comes after the acquisition of CloudKnox Security last year, and is Microsoft's attempt to help boost security across multicloud environments -- or "secure access for a connected world".

Bolstering the product family, the company has also launched cloud permission management tool Microsoft Entra Permissions Management​, and Microsoft Entra Verified ID​ -- a system that allows for more secure interactions, based on decentralized identity standards. Microsoft has also announced public previews of Workload Identities​ and Lifecycle Workflows.

Continue reading

Broadcom to acquire VMware for $61 billion

Broadcom

Broadcom has struck a deal with VMware that will see the chipmaker buying the cloud and virtualization software firm for around $61 billion in cash and stock. As part of the acquisition, Broadcom will also take on $8 billion of VMware's net debt.

When the deal is complete, Broadcom Software Group will rebrand and operate as VMware. As part of Broadcom, the new VMware will, the company says, "offer enterprise customers greater choice and flexibility to address the most complex IT infrastructure challenges".

Continue reading

Business-critical systems going unsecured and unmonitored

endpoint security

According to a new poll 40 percent of enterprises don't include business-critical systems such as SAP in their cybersecurity monitoring. In addition, a further 27 percent are unsure if systems are included in their cybersecurity monitoring at all.

The survey from Logpoint also shows only 23 percent say the process of reviewing SAP logs for cybersecurity events or cyberthreat activity is automated through SIEM, with almost 19 percent still doing so manually.

Continue reading

Growing complexity leads enterprises to look for new service providers

Cloud maze complexity

A new study from CloudBolt Software reveals that 80 percent of enterprises are so frustrated with their existing cloud-oriented provider they are actively looking for a replacement within the next twelve months.

At the core of this dissatisfaction with CSPs and MSPs is the growing complexity of multi-cloud environments, and a widening skills gap among both enterprises and service providers.

Continue reading

What is unified observability and why is it important? [Q&A]

There has been much discussion around observability in the past few months. With the adoption of hybrid work models and cloud systems, IT leaders have quickly realized the business and security value of creating transparency within their existing tech infrastructure.

Digital experience company Riverbed has announced a business move towards a market it's calling 'unified observability'. The company's vice-president Mike Marks spoke to us about the unified observability concept, why it's integral to IT decision-makers' strategies and offers some thoughts on how enterprises can begin integrating it within their current operations.

Continue reading

Why moving to the cloud is right for government agencies

Over the last few years in enterprise IT, the fight between on-premise software and cloud services has been dominating tech conversations. Today, many businesses realize we will never return to the in-office routine we experienced before the pandemic. As remote and hybrid work becomes the norm, constituents now expect to be communicated through various channels, including mobile.

The introduction of mobile-focused operations showcases the need for technology system improvements within the public sector.

Continue reading

Enterprises struggle to discover cloud access policies

Cloud use is commonplace among large enterprises, with 82 percent of organizations with $1B or more in revenue using three or more clouds, up from 66 percent last year.

However, with the majority of companies (70 percent) using two or more identity systems, 75 percent of respondents say they lack the ability to easily discover all existing access policies, according to a new study conducted by Osterman Research for Strata Identity.

Continue reading

Enterprise cloud costs up over 90 percent in the past year

Cloud money

Cloud costs are a measure of the services businesses are using, but they also reflect the wider market and the pricing strategies of providers.

Cloud native service provider Civo has carried out a survey into what businesses are spending on cloud and finds that enterprise cloud costs have risen by 93 percent on average in the past year.

Continue reading

Three-quarters of companies focus development on cloud-native applications

More and more workloads are being shifted to the cloud and a new report from Tigera shows that 75 percent of companies are focusing development on cloud-native applications.

But this increased development and deployment of cloud-native applications also creates the need for more advanced observability and security capabilities.

Continue reading

IT leaders say Log4Shell was a wake-up call for cloud security

Data cloud lock

The Log4Shell vulnerability proved to be one of the major cybersecurity events of last year and its repercussions continue to rumble on.

Research from network security platform Valtix shows 95 percent of IT leaders say Log4Shell was a wake up call for cloud security, changing it permanently, and 87 percent feel less confident about their cloud security now than they did before the incident.

Continue reading

New free tool aims to tackle post-pandemic cloud bloat

Cloud fail

As enterprises have moved to make their systems more accessible to hybrid working during the pandemic, they have increasingly been turning to cloud-based solutions.

But this rapid growth of cloud infrastructure leads to problems managing and optimizing cloud resources. Which is why cloud networking company Alkira is launching a free tool to expose shadow IT and recommend ways to secure, optimize, and boost cloud deployments.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.