Budget is the top barrier to cloud security objectives


A new survey shows that 59 percent of executives say budget/cost is the top roadblock to achieving their cloud security objectives, followed by complexity (47 percent) and lack of skilled resources (41 percent).
The study from Gatepoint Research for Orca Security of 200 senior decision makers also reveals that 57 percent of respondents identify misconfigurations as their top cloud security risk, followed by unauthorized access (50 percent), data breaches (35 percent), insecure APIs (31 percent), lack of visibility (29 percent), and malicious insiders (12 percent).
Comms providers believe AI will improve operational efficiency


More than half of telecom and IT engineers responding to a new survey believe the use of AI will improve network operational efficiency by 40 percent or more.
In addition the study from Ciena, with research by Censuswide, shows an overwhelming 85 percent of respondents express confidence in communication service providers' (CSPs) ability to monetize AI traffic across networks.
How 'internet fracturing' is challenging enterprise growth [Q&A]


We tend to think of the internet as being something that's the same all over the world, but with nations like China, India and Russia increasingly closing off the wider web to their citizens, is the global nature of the internet under threat?
We spoke to Ruoting Sun, VP of Product at Secureframe about the phenomenon of 'internet fracturing' and what it means for businesses.
Priorities for data center OT security in the cloud era


The decentralized nature of the cloud provides great flexibility for users, but it also introduces great vulnerabilities for data center operators. As an abundant source of valuable data, the modern data center has become a prime target for cybercriminals, from small business facilities to the huge hyperscale colocation data centers run by Amazon, Google, and Microsoft.
Protecting these interconnected facilities and the hardware and software systems that they physically host provides a perpetual job for security teams. But it’s important to recognize the clear distinction between securing information technology (IT) inside a data center facility, versus securing the operational technology (OT), or what’s called “cyber-physical systems” needed to run the facility itself. IT and OT involve two complementary but distinct categories of security and risk.
Avoid a migration mess -- top tips for cloud migration


Cloud adoption is increasing at a rapid rate across all industries, and for good reason. It has been proven as a business enabler, and it presents many advantages over traditional architecture. Hardware starts to age, data center operations are costly, and IT personnel spend more time managing old infrastructure than advancing the business. Migrating existing workloads to the cloud can help address all these issues.
However, IT architecture can be extremely complicated, even for professionals with many years of experience, and even though the cloud has been around for over 20 years, cloud migration challenges continue to be a source of anxiety for organizations wishing to take advantage of everything cloud computing can offer. So, what are some of the points to bear in mind when planning and executing a cloud migration strategy?
95 percent of organizations suffer cloud breaches


New research from Tenable reveals that 95 percent of 600 organizations surveyed suffered a cloud-related breach in the previous 18 months.
An additional 29 percent reported the breach caused 'significant' harm, which is defined as any adverse consequences to someone or an organization if the confidentiality of PII were breached.
Protecting sensitive data in the cloud [Q&A]


The use of sensitive data for business is crucial. The growing amount of sensitive data stored in cloud infrastructure and applications creates an increasing and constantly evolving data risk landscape for organizations.
The main cause of risk is how broadly this data is shared within and outside the organization, and how it is being used by users, services, or other applications. We spoke to Liat Hayun at Eureka Security about how this risk can be addressed while still allowing safe use and storage of data.
80 percent of security exposures involve misconfigurations


A new report based on data gathered from over 40 million exposures presenting high-impact risks to millions of critical business entities, finds that identity and credential misconfigurations represent 80 percent of security exposures across organizations.
The report, from exposure management specialist XM Cyber based on data analyzed by the Cyentia Institute, shows a third of these exposures put critical assets at direct risk of breach -- an attack vector actively being exploited by adversaries.
Cloud security and speed -- how fast do your processes need to be? [Q&A]


Moving to the cloud offers many benefits for businesses, but it doesn't remove the need to keep your systems secure. The tools that make the cloud fast and attractive for business can also be used by attackers.
We spoke to Anna Belak, director, Office of Cybersecurity at Sysdig to discuss the pain points that she sees security teams dealing with today, where those problems come from, and how to address them around process and skills rather than just looking at the tech side.
Google Drive finally gets dark mode on the web


It has been an extraordinarily long time coming, but Google has finally decided to flip the switch on dark mode for Drive on the web.
Much like AI is at the moment, the spread of a dark mode option for apps and websites was something of a cultural and technological phenomenon a few years ago. Quite why it has taken Google such a long time to jump back on this particular bandwagon is anybody's guess, but dark mode will be welcomed by Google Drive users none the less. Here's what you need to know.
Enterprises not getting full value from their data


According to a new report, 73 percent of IT leaders are still struggling to transform data into delivering significant business value.
The survey of 150 UK IT leaders by cloud consultancy Appsbroker & CTS finds 91 percent have a specific mandate from their board or executive team to make their organization more data-driven and data-centric.
Cloud computing -- The first step to an effective data modernization strategy


Many organizations realize the benefits that lie within the data they collect daily. This modern approach to data empowers businesses to leverage data for innovation and monetization while at the same time enhancing security and privacy. While this may seem like a conundrum as companies have traditionally buried their data deep into IT architecture to prevent it from being accessible, even by the employees, today it is possible to have the best of both. This process starts with the cloud.
The healthcare sector is witnessing a swift surge in cloud adoption. By 2028, it is expected to grow at a Compound Annual Growth Rate (CAGR) of 18.74 percent. This trend of rapid adoption can be seen in the financial services sector too, where organizations are moving to the cloud at an accelerated pace.
Securing your SaaS applications: Best practices in a cloud-native era


Software as a Service (SaaS) has emerged as a cornerstone for organizations seeking flexibility, scalability, and efficiency in their operations. With the convenience of accessing applications over the internet, SaaS adoption has surged, offering unparalleled opportunities for innovation and growth. According to recent data, the global SaaS market is projected to reach $282.20 billion this year, reflecting the growing reliance on cloud-based software solutions. However, alongside these benefits come inherent security challenges that necessitate a proactive approach to risk management.
The widespread shift to remote work and the rapid adoption of cloud-based solutions, including SaaS applications, have introduced significant security challenges for organizations.
Get 'The Cloud Computing Journey' (worth $35.99) for FREE


As the need for digital transformation and remote work surges, so does the demand for cloud computing.
However, the complexity of cloud architecture and the abundance of vendors and tools can be overwhelming for businesses. The Cloud Computing Journey addresses the need for skilled professionals capable of designing, building, and managing scalable and resilient cloud systems to navigate the complex landscape of cloud computing through practical tips and strategies.
Peace of mind: Cloud is key in scaling systems to your business needs


Meeting the demands of the modern-day SMB is one of the challenges facing many business leaders and IT operators today. Traditional, office-based infrastructure was fine up until the point where greater capacity was needed than those servers could deliver, vendor support became an issue, or the needs of a hybrid workforce weren’t being met. In the highly competitive SMB space, maintaining and investing in a robust and efficient IT infrastructure can be one of the ways to stay ahead of competitors.
Thankfully, with the advent of cloud offerings, a new scalable model has entered the landscape; whether it be 20 or 20,000 users, the cloud will fit all and with it comes a much simpler, per user cost model. This facility to integrate modern computing environments in the day-to-day workplace, means businesses can now stop rushing to catch up and with this comes the invaluable peace of mind that these operations will scale up or down as required. Added to which, the potential cost savings and added value will better serve each business and help to future-proof the organization, even when on a tight budget. Cloud service solutions are almost infinitely flexible, rather than traditional on-premises options and won’t require in-house maintenance.
Recent Headlines
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.