Articles about Cloud

Adopting best practice approaches for hybrid working [Q&A]

home working

More and more businesses are moving to a hybrid work model. But while this approach can offer improved value along with the tools to drive the business forward, it can also present a number of challenges.

So what does it take to succeed with a hybrid approach? We spoke to Cisco Webex's Lorrissa Horton to find out.

Continue reading

Microsoft announces general availability of Windows Server 2022

Gold Microsoft sign

It is a couple of weeks since Microsoft almost silently released Windows Server 2022, and now the company has officially announced that the operating system is generally available.

The release comes just over a month before the rollout of Windows 11 begins, and there is a strong focus on security. In particular, there is the addition of encrypted hypertext transfer protocol secure (HTTPS) and AES-256 encryption with support for server message block (SMB) protocol. The latest version of Windows Server also greatly increases hardware support.

Continue reading

Digital forensics in modern cloud environments [Q&A]

Increasingly applications and infrastructure are moving to the cloud and containers. But although this offers convenience and cost savings it introduces challenges when security incidents occur.

We spoke to James Campbell, CEO and co-founder of Cado Security to find out about the importance of digital forensics when dealing with cloud system breaches.

Continue reading

Move to the cloud opens opportunities for cybercriminals

The rapid shift of applications and infrastructure to the cloud creates gaps in security according to a new threat report from security platform Lacework.

This increases the opportunities for cybercriminals to steal data, take advantage of an organization's assets, and to gain illicit network access.

Continue reading

New platform offers secure cloud data integration

Secure cloud

As enterprises continue to migrate data to the cloud they need to ensure that sensitive information is properly protected.

Automated data integration specialist Fivetran is launching a platform that offers a set of key security-related features, allowing companies to create a more secure modern data stack that meets internal and regulatory requirements.

Continue reading

Microsoft Azure found to have the 'worst cloud vulnerability you can imagine' -- ChaosDB

Microsoft building logo

Security researchers have discovered a serious security vulnerability in Microsoft Azure that could given an attacker unfettered access to any and all of the databases stored on its Cosmos DB service.

Researchers from security firm Wiz found that it is not only possible but trivial to obtain the primary keys to databases. The vulnerability, dubbed ChoasDB, may have existed since the introduction of the Jupyter Notebook back in 2019, and it gives attackers the ability to access, edit and delete data or entire databases. Microsoft is unable to change primary keys itself, and has emailed customers to advise them to do so; but the company has been criticized for failing to contact sufficient numbers of users.

Continue reading

SMEs make a rapid shift to hybrid working

According to new research 42 percent of SMEs have moved, or are planning to move, offices to facilitate hybrid working, with those downsizing reducing their office space requirements by an average of 38 percent.

The study from UK data center specialists ServerChoice shows that these office moves are causing SME business leaders to rethink their IT strategies and shift their server infrastructure away from on-premises to either co-location facilities or public/private cloud.

Continue reading

Cado offers enterprises a free cloud security investigation

magnifier

The rapid shift to cloud and remote working environments has raised security concerns for businesses and also meant hackers have increasingly turned their attention to cloud-native systems.

In response to this, digital forensics platform Cado Security is offering enterprises unlimited access to its Cado Response platform, including container and memory forensics, for 14-days, allowing them to carry out a free investigation.

Continue reading

IT leaders struggle to support unstructured data in the cloud

rain cloud

The majority of organizations are managing more than 1PB of data and spending more than 30 percent of their IT budgets on data storage and protection, according to a new report into unstructured data from data management company Komprise.

Based on responses from 300 IT storage decision makers at companies in the US and UK, it finds 65.5 percent of organizations spend more than 30 percent of their IT budgets on data storage and management.

Continue reading

Businesses boost SecOps staffing to guard against threats

Security

A report out today shows that 85 percent of enterprises have increased their budget investment in security operations during the pandemic, while 72 percent have increased their staffing and 79 percent have increased their adoption of advanced security technologies.

The study from the CyberRes arm of Micro Focus also reveals that security operations centers (SOCs) have increased their adoption of the cloud, with 95 percent now deploying their solutions in hybrid-cloud environments.

Continue reading

Why cloud adoption requires an organization-wide culture change

Cloud

In the space of a year, society has transformed beyond recognition because of COVID-19 and cloud-first for most organizations is now an imperative. To this point, by the end of 2021, 67 percent of all enterprise infrastructure will be cloud-based. But what does this mean for organizational culture, will it change -- and should it change? After all, now cloud adoption is greater than just the IT department. Whether it be a heavier reliance on the accounting team, closer collaboration with the business teams, or better information sharing with the internal IT team, cloud changes the dynamics of team interactions.

Today, an organization's existing culture can strongly predict the potential for cloud success; likewise cloud adoption does have the potential to also alter the company’s culture. It can dramatically change the day-to-day work of individual IT team members, but with the willingness to adjust employee skillsets, a wide range of opportunities can become available as a result of cloud.

Continue reading

Why big data warehousing is the next frontier for boosting CX

It’s been decades since the term "the customer is always right" placed customer experience (CX) at the heart of every transaction, but delivering excellence in CX hasn’t become much simpler with the passage of time.

Customers effectively expect businesses to read their minds, and they don’t have much patience for those that fail. A recent PWC survey concluded that one-third of consumers would abandon a brand they love after just one negative experience, showing just how high the bar is set for CX.

Continue reading

ExtraHop provides deep threat insights for hybrid cloud

cloud magnifier

The expansion of cloud use and remote working have made protecting business systems much more complicated, with simple perimeter controls no longer enough.

ExtraHop is launching updates to its Reveal(x) 360 cyber defense platform that provide deep forensic insight into hybrid cloud networks to allow for advanced threat response.

Continue reading

Why unintentional insider data leaks are still a problem for businesses [Q&A]

Insider threat

Whilst threats to data are often seen as being down to external actors, it's often the case that leaks, both intentional and otherwise, can come from insiders.

Unintentional or accidental leaks remain a major problem, and one that’s been made worse thanks to more home working. We spoke to Rajan Koo, SVP, engineering and cyber intelligence at DTEX Systems to learn more about this type of threat and how businesses can address it.

Continue reading

Protect cloud-native data with cloud-native backup and recovery software

Cloud recovery

Cloud-native applications are rapidly being deployed in full production. To manage cloud-native data, organizations are turning to Kubernetes-friendly storage platforms.

However, with these apps supporting real-world use cases, organizations need to plan beyond general data storage by deploying cloud-native backup and recovery software to protect these key applications and their data.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.