Articles about Cloud

How organizations can get a handle on cloud security [Q&A]

Cloud data protection

As cloud-based enterprises continue to grow, the security threats in the cloud grow with them. Organizations operate in complex, multilayered environments that leave security teams scrambling to protect all of their organization's assets and resources. In fact, they may not even be aware of all of them.

What are the biggest risks they face today? And how can organizations mitigate their vulnerabilities?

Continue reading

Google adds new file recovery option to the new Drive for desktop app

Cloud bursting through laptop screen

Google upset a lot of people recently when synchronization issues caused a "small subset" of Google Drive users to lose months' of data. The number of people affected is not known, but even a small subset of a large userbase is, potentially, a huge number.

Now there is some good news. In releasing an updated version of Drive for desktop, Google is giving users access to file recovery options that should make it possible to regain access to files that were lost.

Continue reading

84 percent of organizations combine IT and security operations in one analytics tool

A new survey of 500 full-time security decision-makers and practitioners finds that 84 percent indicate their organization combines security and data operations into a single analytics tool.

However, the study from Observe shows more than half of the security relevant data that goes into observability systems needs to be transformed before it can be used.

Continue reading

Multicloud by design: Making a cloud environment that truly works 

We all know the saying: you can’t have it all. The same applies to the cloud providers -- a single one cannot give and be everything you need. 

Increasingly we are seeing customers demand higher standards from their cloud services in an effort to reduce savings and security risks, as well as enhance their flexibility. In a landscape that is always changing, many sectors are feeling the need to keep up with technology or even try to be one step ahead of it. To meet these complex requirements, companies may want to look a little wider than their single cloud provider set-up and into the world of multicloud. 

Continue reading

2024 vision: Trends shaping the IT landscape

2024 Cloud

The IT and cloud computing landscape has grown and evolved in 2023, and it’s poised to continue developing in 2024. Companies worldwide are actively adapting to the dynamics of a post-pandemic world. In this pursuit of resilience and innovation, we anticipate the emergence of four key trends that will shape the new year. These trends encompass technological advancements and shifting IT paradigms regarding spending, loyalty and governance.

Here are four trends we will likely see in the new year.

Continue reading

Why you need a multi-layered strategy to secure the cloud [Q&A]

cloud security

Recent cyber attacks have seen not just the usual monetary motives but also the rise of espionage attempts with attacks on government officials.

So how can organizations, both public and private sector, protect their most valuable assets? We spoke to Glenn Luft, VP of engineering at Archive360, to find out.

Continue reading

Cloud storage vulnerable to ransomware attacks

New research from Dig reveals that cloud assets like Amazon S3 buckets and Azure Storage accounts are being left open to ransomware attacks thanks to poor configuration.

It shows that only 31 percent of S3 buckets have versioning enabled, an essential for data recovery, while just two-thirds of sensitive buckets have logging enabled, a prerequisite for detection. In addition 72 percent of remote CMK buckets are not actively monitored.

Continue reading

AWS launches its own thin client for enterprises

As more and more organizations turn to SaaS and cloud solutions, having a powerful PC as a desktop solution becomes hard to justify, not to mention the support and security issues that come along with it.

Step forward AWS with the launch of the Amazon WorkSpaces Thin Client, aimed at enterprise workers in order to reduce an employer's technology costs and provide enhanced security.

Continue reading

4 best practices in cloud security to strengthen national defense in the automation age

In the era of digital transformation, national security faces complex and multifaceted challenges. To address these challenges, the Department of Defense (DOD) is taking a vigilant approach to fortify the security of cloud infrastructure.

This approach seamlessly aligns with overarching national cybersecurity initiatives, which are focused on countering a multitude of emerging threats in the age of automation. Collaboratively, the DOD and other government agencies are dedicated to strengthening the ever-evolving cloud ecosystem, while navigating an increasingly intricate threat landscape.

Continue reading

Addressing the risks of using bulk remediation with Google Drive [Q&A]

Bulk remediation in Google Shared Drives can be useful in removing unneeded permissions, revoking expired access and ensuring that data remains secure.

But it can also present significant challenges due to the complex nature of managing permissions across a large number of files and users. Administrators face the difficulty of ensuring accurate and appropriate access levels for each file and user.

Continue reading

Businesses worry more about reputational damage than financial loss following a breach

Following a cloud breach, the top three worries of businesses are reputational damage and loss of public trust (39 percent); loss of sensitive data (36 percent); and a loss of revenue generating services (35 percent).

A new report from Illumio, based on a survey of 1,600 IT and security decision makers by Vanson Bourne, finds that in the last year, nearly half of all data breaches (47 percent) originated in the cloud, and more than six in 10 respondents believe cloud security is lacking and poses a severe risk to their business operations.

Continue reading

96 percent of organizations vulnerable due to mismanaged secrets

Data secret

A new study from Akeyless Security finds that modern DevOps and multi-cloud environments are susceptible to secrets-related breaches and that over 70 percent of organizations have had credentials, certificates and keys breached in the last two years.

Based on responses from over 200 professionals with security responsibility in organizations with over 1,000 employees, the report finds one in three security professionals have ranked secrets management among their top five priorities.

Continue reading

Get 'Cloud Security Automation' (worth $39.99) for FREE

For many enterprises, the move to cloud computing has raised concerns for security, but when applications are architected with focus on security, cloud platforms can be made just as secure as on-premises platforms.

Cloud instances can be kept secure by employing security automation that helps make your data meet your organization's security policy.

Continue reading

IT pros worry about Kubernetes security

Cloud data protection

A new survey of 800 security and IT leaders from large organizations shows 76 percent of security and IT pros believe we are heading towards a cloud reckoning in terms of costs and security.

The study from Venafi finds that 84 percent believe Kubernetes will soon be the main platform used to develop all applications. But, three-quarters worry that the speed and complexity of Kubernetes and containers is creating new security blind spots.

Continue reading

'Policy as code' considered vital to maintain and secure cloud software

A new survey of over 280 developers and technical decision makers finds two-thirds dealing with major flaws in homegrown authorization efficiency, security, and app performance. As a result, most organizations (83 percent) plan to invest more into policy as code as a solution.

In case you're unfamiliar with the concept, policy-as-code is an approach to policy management in which policies are defined, shared, updated and enforced using code rather than relying on manual processes.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.