Microsoft and Oracle connect their clouds
Two of the giants of enterprise cloud technology have today announced a cloud interoperability partnership, enabling customers to migrate and run mission-critical enterprise workloads across Microsoft Azure and Oracle Cloud.
Enterprises can now seamlessly connect Azure services, like Analytics and AI, to Oracle Cloud services, like Autonomous Database. By enabling customers to run one part of a workload within Azure and another part of the same workload within the Oracle Cloud, the partnership delivers a highly optimised, best-of-both-clouds experience.
Secure contact center payment solution comes to the cloud
Contact center data security specialist Semafone is making its Cardprotect available as a cloud solution in the US for the first time.
Companies now have the choice of running Cardprotect on premise, as a managed appliance, in a hybrid could or fully cloud solution. The new, cloud version enables a much faster, more scalable, flexible and cost-effective deployment, as there is no need for contact centers to purchase or manage equipment.
5 mistakes you might be making with your company's IT infrastructure
Technology has changed the way that companies in most industries do business. From internal communications to external marketing and PR, market research to customer engagement, and decision-making through to execution, virtually every facet of modern business leans on technology or data in a significant way. Because of this reality, the average company’s IT infrastructure is the beating heart of the organization. Without workable IT, the average business won’t just be slowed down; it will be unable to function.
Most businesses have workable IT. However, many companies could be doing more with technology if they learned how to avoid these five common pitfalls of IT infrastructure design, operation, and maintenance.
Enterprises struggle with providing secure hybrid access
As businesses move towards hybrid IT environments they increasingly face threats, gaps and investment challenges to keep their systems secure.
The study from secure access specialist Pulse Secure surveyed enterprises with 1000+ employees in the US, UK, Germany, Austria and Switzerland and finds that while they are taking advantage of cloud computing, all enterprises have on-going data center dependencies.
Providing guardrails for developers to innovate while staying secure in the cloud
Enterprise cloud adoption has largely been driven by developers eager to take advantage of its agility. These developers are often moving very quickly and are under pressure to bring new products to market that provide competitive advantages. The speed of development combined with a lack of cloud security expertise often results in engineers and developers bypassing certain security and compliance policies. The result is a chaotic, "Wild, Wild West" cloud environment.
Alongside innovative apps and services, a common byproduct of this "free for all" mentality is data breaches, thanks to misconfigurations and other security glitches. This article shares advice on how organizations can empower their developers and engineers by providing a safe framework within which to operate, so they can stay agile and innovative, without inadvertently compromising security.
46 percent of organizations consider taking personal data out of the cloud
A new study finds that 46 percent of organizations which store customer personally identifiable information (PII) in the cloud are considering moving it back on premises due to data security concerns.
The research from information security software company Netwrix also shows that of the 50 percent of organizations that store customer data in the cloud, 39 percent had security incidents in the past year and more than 50 percent of those couldn’t diagnose the problem.
Is latency the cloud's Achilles heel? [Q&A]
The cloud is arguably the most transformative enterprise technology in the past two decades. Yet, as powerful as it is, it faces a huge latency problem -- and the big public cloud providers know it.
Their data centers can't be everywhere and close to every end-user, so the big distances created result in unavoidable latency.
Uncovering the everyday frustrations of cybersecurity professionals
Anyone who has worked in IT knows that it can be a frustrating experience at times. A new survey carried out by network security provider Lastline at RSAC 2019 set out to discover security professionals' attitudes and frustrations towards their jobs.
These come from a number of places, including resources, management and other workers. We all know that there's a skills shortage in security, but funding is often an issue too.
Companies continue to struggle with privileged access management
Privileged accounts can be a headache for organizations so you'd expect managing them to be a high priority for security teams. However, a new report from Thycotic reveals that 85 percent fail to achieve even basic privileged security hygiene.
In addition 55 percent have no idea how many privileged accounts they have or where they’re located, while over 50 percent of their privileged accounts never expire or get deprovisioned.
Microsoft's core platform isn't software, it's trust
For the first time in a half-decade, I watched a Microsoft Build keynote this morning. Time gives fresh perspective, looking at where the company was compared to where it is today. Listening to CEO Satya Nadella and other Softies, I repeatedly found myself reminded of Isaac Asimov's three laws or Robotics and how they might realistically be applied in the 21st Century. The rules, whether wise or not, set to ensure that humans could safely interact with complex, thinking machines. In Asimov's science fiction stories, the laws were core components of the automaton's brain—baked in, so to speak, and thus inviolable. They were there by design; foundationally.
Behind all product design, there are principles. During the Steve Jobs era, simplicity was among Apple's main design ethics. As today's developer conference keynote reminds, Microsoft embraces something broader—design ethics that harken back to the company's founding objectives and others that share similar purpose as the robotic laws. On the latter point, Nadella repeatedly spoke about "trust" and "collective responsibility". These are fundamental principles of design, particularly as Artificial Intelligence usage expands and more corporate developers depend on cloud computing platforms like Azure.
IBM uses technology to help hurricane-hit communities
To mark the start of US National Hurricane Preparedness Week this week, The Weather Company, an IBM Business, is releasing not just its 2019 hurricane forecast, but also analytic data that looks at how weather affects preparedness, emotion and consumer habits.
In addition, through its Code and Response deployment initiative which aims to put open source technologies to use for social good, IBM is taking action to help save the lives of people in communities that are vulnerable to natural disasters.
Digital transformation is putting government data at risk
The push towards digital transformation in the US government is putting sensitive data at risk, according to a new report from data protection specialist Thales.
Almost all (98 percent) of respondents from federal agencies report that they are using sensitive data within digital transformation technology environments. Yet, less than a third of respondents are using data encryption within these environments.
New Arcserve release helps protect hybrid environments
With the launch of its latest Unified Data Protection (UDP) product, backup specialist Arcserve is aiming to remove the multiple points of failure typically introduced into IT environments through a piecemeal, 'do-it-yourself' approach to data backup and disaster recovery.
Using an image-based technology, the new Arcserve UDP extends proven backup and DR technologies to protect every type of workload, including Nutanix AHV and Microsoft Office 365.
What is fueling container and multicloud adoption? [Q&A]
Containers and cloud native applications are transforming how quickly and reliably organizations can bring ideas to market, while also providing the key building blocks for multicloud strategies.
But for all the speed, agility, and elasticity these technologies promise, they also create a complexity tipping point. Across industries, IT staff looking to deliver on the benefits of container and multicloud strategies -- without being overwhelmed by complexity -- are increasingly turning towards workload automation.
Personal details of 80 million US households exposed on unsecured Microsoft cloud server
Security researchers have discovered an unprotected database stored on a Microsoft cloud server. The 24GB database includes personal information about 80 million households across the US.
The researchers from vpnMentor were working on a web mapping project when they made the discovery. They say that as the database they found left out in the open relates to American households which include multiple residents, the data breach could potentially affect hundreds of millions of people.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.