Security is top priority in choosing cloud solutions


Security is the main priority when selecting cloud solutions according to a new report which shows businesses are increasingly adapting their security to suit the cloud.
The study for cloud security automation company Lacework carried out by analysts Hurwitz & Associates shows that 'safe and secure' tops the list of desirable cloud characteristics, cited by 53 percent of respondents.
Arcserve launches affordable cloud disaster recovery service


Disaster recovery has often been a choice between maintaining system availability at high cost, or choosing a cheaper solution at the expense of longer recovery times.
Now data protection and recovery specialist Arcserve is launching a new direct-to-cloud disaster recovery as a service (DRaaS) and backup as a service (BaaS) solution aimed at mid-sized businesses.
Data threats are the new reality as organizations embrace transformative technologies


With 99 percent of organizations using big data, 94 percent Internet of Things devices, and 91 percent using or working on mobile payments, there are more attack surfaces than ever and new risks that need to be addressed.
A new study from systems and cyber security company Thales e-Security finds the extent and impact of increased threats clearly shown in levels of data breaches and vulnerability.
How GDPR will affect your email archiving [Q&A]


The arrival of GDPR is set to impact on many aspects of commercial operation, not least email. But what about old emails that are stored or archived?
We spoke to Marc French, chief trust officer at cloud email specialist Mimecast to find out more about GDPR and an aspect that organizations may have overlooked.
Organizations blame their own staff for cloud security incidents


When systems are in the cloud, 45 percent of organizations perceive their own employees to be the biggest security risk, according to a new report.
According to user behavior specialist Netwrix, even though the majority of attacks they experienced over the year were external, organizations blame their own IT staff (39 percent) and business users (33 percent) as much as or more than their cloud providers (33 percent).
How moving inventory to the cloud can streamline your business [Q&A ]


A major trend we've been seeing in inventory management (and business, in general) is for companies to move from a desktop solution to a cloud solution. This has profound implications for the nature of how businesses manage their inventory, and we thought it would be interesting to get the low down on this trend from an industry expert.
Christy Hair is an inventory solution specialist with Boxstorm, an online inventory management specialist. We asked her a series of questions about cloud inventory management and how moving a company's inventory to the cloud can help it streamline its processes in new ways.
Fewer than five percent of enterprise apps will move to the cloud in 2018


A new study of over 160 IT directors and chief technology officers at companies with more than 1,000 employees shows that while 78 percent are planning to upgrade their enterprise applications, the cloud doesn't feature in many plans.
The survey by digital experience platform Sapho reveals that fewer than five percent of enterprise apps will migrate to the cloud from on-premises in 2018, mainly because of security and compliance issues, but also because many of these apps are so ingrained in daily business processes, they can't be moved.
Organizations could face up to $19 billion in losses if a cloud provider is hacked


If a hacker were to gain control of a cloud provider for over three days, businesses could face losses up to a whopping $19 billion, with SMBs carrying the largest economic and insurance losses, according to a new report.
In partnership with the American Institutes for Research (AIR), insurance market Lloyd's of London is unveiling a new report detailing the financial impact of a cyberattack on a US cloud provider.
HyperStore platform lets businesses unify cloud and in-house storage


The rise of the cloud has made for greater complexity in business IT environments, with data accumulating on different platforms and in different locations.
To address this problem, object storage company Cloudian is launching a new version of its HyperStore platform which integrates data management capabilities to bridge traditional and cloud native environments, as well as object and file storage types.
New platform integrates Windows file servers with the cloud


Although businesses are keen to move to the cloud and IaaS solutions, most still have files stored on in-house servers.
Enterprise file sharing and sync platform FileCloud is launching a new product called ServerSync that integrates Microsoft Windows file servers with any IaaS cloud.
New study shows wide gaps in attitudes to cloud security


While a majority of businesses around the world have adopted cloud services, a study released today reveals a wide gap in the level of security precautions applied by companies in different markets.
The study from digital security company Gemalto finds that German businesses are more cautious when it comes to sharing sensitive information in the cloud (61 percent) than British (35 percent), Brazilian (34 percent) and Japanese (31 percent) organizations.
New platform improves visibility of online services


As enterprises move more data to the cloud one of the problems they have is understanding where everything is and how it integrates with existing workflows.
Cyber security and breach analytics specialist Eastwind Networks is launching a new Eastwind for SaaS platform that offers complete visibility for companies using online services, such as G Suite, Office 365, Dropbox, Box and Salesforce.
Cloud workloads at risk from compliance, security and management failings


Security, management and compliance challenges are hitting the benefits businesses are getting from using the cloud as their infrastructures become more complex, according to new research.
The study from security and compliance specialist WinMagic reveals that 39 percent of respondents report their infrastructure is more complex since using the cloud, and 53 percent spend more time on management tasks than they have done previously.
7 things you could do instead of CES


The annual scourge is upon us, as tens of thousands of attention seekers descend on Las Vegas for the Consumer Electronics Show. Nowhere else can you watch bloggers and journalists in a constant chase of their public relations foibles, who desperately hunt for all the attention they can get their clients. Think a thousand kids in a small room, calling for mommy and groping her dress. Then multiply ten times.
My last CES pilgrimage was 2008. That's right, I haven't gone in 10 years. No-o-o-o regrets. Nothing important ever comes out of the show, even though each year the hype suggests otherwise. Most new unveiled products won't ship until second half of the year. If ever. There's more vaporware at CES than hot air—and that's no easy feat. Surely the Las Vegas Convention Center installs extra carbon dioxide scrubbers so that participants don't asphyxiate. If there was an alarm for toxic babble, it would sound incessantly.
Google answers your questions about Meltdown and Spectre vulnerabilities


The revelations about the Spectre and Meltdown vulnerabilities affecting millions of processors around the world has raised a huge number of questions for many people. While businesses and large organizations are rushing to ensure that their systems -- and their data -- are protected, the average computer user has been left wondering what on Earth is going on.
While there are a lot of very technical write-ups about the implications of the Spectre and Meltdown bugs, as well as explanations of just how the exploit works, the average Joe has been left somewhat in the dark. To try to remedy this, Google has answered a series of questions relating to the security issues.
Recent Headlines
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.