Articles about Cloud

The top 11 security threats to cloud computing

cloud lock

Data breaches and misconfigurations come out top of the Cloud Security Alliance's latest Top Threats report which reveals an 'Egregious Eleven' list of cloud security threats.

This year's list no longer includes issues that fall to cloud service providers (CSPs), such as denial of service, shared technology vulnerabilities, CSP data loss and system vulnerabilities. This suggests these are either being well addressed or are no longer perceived as a significant business risk of cloud adoption.

Continue reading

85 percent of enterprise web traffic is cloud services

Cloud

A new study based on aggregated, anonymized data from millions of global users reveals that cloud services now account for 85 percent of all enterprise web traffic.

The report from cloud security company Netskope also reveals that heavy use of cloud services is often driven by multiple instances of cloud service usage across an organization.

Continue reading

Enterprises are modernizing data architectures but still have major concerns

Business database

A new study of over 300 IT executives in large enterprises by database company DataStax reveals all are modernizing their data architecture, but most are still struggling with major challenges.

The results show 99 percent of IT execs report challenges with architecture modernization and 98 percent with their corporate data architectures (data silos). Vendor lock-in (95 percent) is also a key concern among respondents.

Continue reading

Migrating infrastructure to the cloud -- what the board needs to know

Board meeting

If you serve on the board of a UK organization, it’s likely that digital transformation is high on your agenda as you look strategically at futureproofing your business. A key part of that is ensuring that the IT infrastructure supporting your company is functioning robustly as a platform on which to build competitiveness, rather than a legacy anchor holding back innovation and growth. Moving to an Infrastructure-as-a-Service (IAAS) set-up is increasingly the way that companies aim to unlock potential and enable more dynamic, flexible business processes.

The benefits of IAAS are clear: It’s flexible and can easily scale as your business grows. It removes the burden of maintaining legacy systems and allows the easy deployment of new technology and, ideally, you only pay for what you use on a predictable opex basis; you won’t be paying to maintain capacity that is rarely needed. It also allows you to add on services such as analytics and disaster recovery-as-a-service and it’s the perfect environment for the big data projects requiring large workloads and integration with business intelligence tools.

Continue reading

IBM helps developers use open source and machine learning

IBM logo

As artificial intelligence and machine learning become more widespread, it's essential that developers have access to the latest models and data sets.

Today at the OSCON 2019 open source developer conference, IBM is announcing the launch of two new projects for developers.

Continue reading

Symantec launches new zero trust cloud access security technology

Secure cloud

Increasing volumes of business network traffic are now directed at the cloud and companies need a cost effective way to secure them.

Symantec is announcing updates and innovations across its portfolio of products, giving enterprises the ability to enforce zero trust security policies across SaaS applications, corporate applications hosted in the cloud, email and the internet.

Continue reading

Businesses gain better control of cloud and mobile devices

Cloud

Enterprises around the world are gaining control of previously unmonitored and unsupported cloud applications and mobile devices in their IT environments according to a new report.

The 2019 Trusted Access report from Duo Security looks at more than a million corporate applications and resources that Duo protects. Among the findings are that cloud and mobile use has resulted in 45 percent of requests to access protected apps now coming from outside business walls.

Continue reading

How cloud technology can help SMBs to compete [Q&A]

SMB laptop

Smaller businesses have always found it hard to compete against their larger rivals, but that's starting to change as technology allows a leveling of the playing field.

So how can technology, and in particular the cloud, help to give smaller companies an edge? We spoke to John Buni, CEO and co-founder of the CleanCloud SaaS platform and founder of bespoke tailoring company Tailor Made London, to find out.

Continue reading

New platform streamlines cloud storage support and recovery

cloud button

As businesses move more of their workloads to the cloud they depend on data and applications always being available and secure. But this can conflict with the need for regulatory compliance and effective backup regimes.

Quest Software is launching a new version of its QoreStor product that helps businesses to easily move, recover and store data from on premise and cloud locations.

Continue reading

German schools ban Microsoft Office 365 because of privacy concerns

Office 365

The German state of Hesse has banned schools from using Microsoft Office 365 because it fears the software opens up student and teachers' private information to the risk of "potential access by US authorities".

The Hesse Commissioner for Data Protection and Freedom of Information (HBDI) believes that Office 365 is in contravention of GDPR legislation, and also expressed concerns about the collection of telemetry data by Windows 10.

Continue reading

Planning a cloud migration? Get your identity privileges in check first

Cloud infrastructure is the foundation of most enterprises and any crack can cause significant damage. A great example of this is the 2017 AWS S3 outage, which was caused by an unauthorized administrator typing an incorrect command when trying to fix a billing system slowdown. The fact that the admin had access to a larger subsystem is what led to the problem that ultimately cost customers an estimated $150 million.

Unfortunately, the probability of identities intentionally or accidentally misusing privileges -- and a corresponding impact on business -- is going to increase greatly for enterprises embracing cloud. In May 2019, for example, a faulty database script deployed by Salesforce inadvertently gave all users full access to sensitive company and customer data, forcing the company to shut down its Marketing Cloud services for 15+ hours.

Continue reading

New platform simplifies handling multi-cloud environments

cloud link

The rise of cloud adoption has led many businesses to adopt an environment where computing requirements are decoupled from storage and scale independently. But this leads to problems with accessibility and data management.

A new platform launched today by Alluxio provides improved orchestration for data engineers managing and deploying analytical and AI workloads in the cloud, particularly for hybrid and multi-cloud environments.

Continue reading

Easily share large files with Dropbox Transfer

Dropbox Transfer

Dropbox has revealed a new file sharing service that makes it possible to send files of up to 100GB.

The company says the service has been designed as a quick and easy alternative to configuring sharing and permissions, and it means that it is possible to share large files even with people who do not have Dropbox accounts.

Continue reading

Is your online cloud storage secure enough?

Cloud data security

Having cloud storage is a reality of living and working in an ever more connected world, where we expect to have access to our data anywhere with an internet connection at the drop of a hat. Cloud storage makes it easier for us to travel, to share and most importantly keep our data safe. However, not all cloud storage solutions are created equal. While many commercial services are more quick and convenient, they sacrifice security in order to be more accessible. If you deal with sensitive data such as financial documents for clients, are you using a cloud solution that’s secure enough?

When using cloud services for storing and sharing critical documents it’s important to know if you’re using a solution that employs the highest levels of protection. To know if a cloud solution is secure enough, you need to determine if it has any of the following features:

Continue reading

IBM officially acquires Red Hat for $34 billion -- Linux distros are unaffected

Red Hat and IBM

IBM has closed its acquisition of Red Hat following the statement of intent back in October. Following the $34 billion deal, Red Hat will operate as a distinct unit within IBM -- and will be reported as part of IBM's Cloud and Cognitive Software segment.

For IBM, the deal means fully embracing open source as it looks to accelerate its business model within the enterprise. For Red Hat, it means expanding its client base and working with a big player in the enterprise cloud business.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.