Articles about Cloud

Cloud storage vulnerable to ransomware attacks

New research from Dig reveals that cloud assets like Amazon S3 buckets and Azure Storage accounts are being left open to ransomware attacks thanks to poor configuration.

It shows that only 31 percent of S3 buckets have versioning enabled, an essential for data recovery, while just two-thirds of sensitive buckets have logging enabled, a prerequisite for detection. In addition 72 percent of remote CMK buckets are not actively monitored.

Continue reading

AWS launches its own thin client for enterprises

As more and more organizations turn to SaaS and cloud solutions, having a powerful PC as a desktop solution becomes hard to justify, not to mention the support and security issues that come along with it.

Step forward AWS with the launch of the Amazon WorkSpaces Thin Client, aimed at enterprise workers in order to reduce an employer's technology costs and provide enhanced security.

Continue reading

4 best practices in cloud security to strengthen national defense in the automation age

In the era of digital transformation, national security faces complex and multifaceted challenges. To address these challenges, the Department of Defense (DOD) is taking a vigilant approach to fortify the security of cloud infrastructure.

This approach seamlessly aligns with overarching national cybersecurity initiatives, which are focused on countering a multitude of emerging threats in the age of automation. Collaboratively, the DOD and other government agencies are dedicated to strengthening the ever-evolving cloud ecosystem, while navigating an increasingly intricate threat landscape.

Continue reading

Addressing the risks of using bulk remediation with Google Drive [Q&A]

Bulk remediation in Google Shared Drives can be useful in removing unneeded permissions, revoking expired access and ensuring that data remains secure.

But it can also present significant challenges due to the complex nature of managing permissions across a large number of files and users. Administrators face the difficulty of ensuring accurate and appropriate access levels for each file and user.

Continue reading

Businesses worry more about reputational damage than financial loss following a breach

Following a cloud breach, the top three worries of businesses are reputational damage and loss of public trust (39 percent); loss of sensitive data (36 percent); and a loss of revenue generating services (35 percent).

A new report from Illumio, based on a survey of 1,600 IT and security decision makers by Vanson Bourne, finds that in the last year, nearly half of all data breaches (47 percent) originated in the cloud, and more than six in 10 respondents believe cloud security is lacking and poses a severe risk to their business operations.

Continue reading

96 percent of organizations vulnerable due to mismanaged secrets

Data secret

A new study from Akeyless Security finds that modern DevOps and multi-cloud environments are susceptible to secrets-related breaches and that over 70 percent of organizations have had credentials, certificates and keys breached in the last two years.

Based on responses from over 200 professionals with security responsibility in organizations with over 1,000 employees, the report finds one in three security professionals have ranked secrets management among their top five priorities.

Continue reading

Get 'Cloud Security Automation' (worth $39.99) for FREE

For many enterprises, the move to cloud computing has raised concerns for security, but when applications are architected with focus on security, cloud platforms can be made just as secure as on-premises platforms.

Cloud instances can be kept secure by employing security automation that helps make your data meet your organization's security policy.

Continue reading

IT pros worry about Kubernetes security

Cloud data protection

A new survey of 800 security and IT leaders from large organizations shows 76 percent of security and IT pros believe we are heading towards a cloud reckoning in terms of costs and security.

The study from Venafi finds that 84 percent believe Kubernetes will soon be the main platform used to develop all applications. But, three-quarters worry that the speed and complexity of Kubernetes and containers is creating new security blind spots.

Continue reading

'Policy as code' considered vital to maintain and secure cloud software

A new survey of over 280 developers and technical decision makers finds two-thirds dealing with major flaws in homegrown authorization efficiency, security, and app performance. As a result, most organizations (83 percent) plan to invest more into policy as code as a solution.

In case you're unfamiliar with the concept, policy-as-code is an approach to policy management in which policies are defined, shared, updated and enforced using code rather than relying on manual processes.

Continue reading

Organizations can only stop 57 percent of cyberattacks

Attack route

Over the last two years, the average organization's cybersecurity program was prepared to preventively defend against, or block, just 57 percent of the cyberattacks it encountered. This means 43 percent of attacks launched are successful and need to be remediated after the fact.

This is among the findings of a new report from Tenable, based on a survey of over 800 IT and cybersecurity leaders carried out by Forrester Consulting.

Continue reading

Over half of enterprises struggle to get insights from their data

Research released this week from Hitachi Vantara shows 55 percent of enterprises are struggling to derive meaningful insights from their data.

The survey of over 200 IT leaders across North America and Europe, carried out by Forrester Consulting, reveals ongoing challenges related to security, inflexible systems, isolated data, a skilled labor shortage, and the need for infrastructure agility.

Continue reading

New service aims to make cloud more accessible

Cloud access

With so many different platforms and technologies available, navigating the world of cloud computing can be tricky.

In a bid to make things simpler Acorn Labs is announcing public beta availability of its cloud developer platform Acorn, a service that makes it simple for anyone to run software in their own cloud sandbox and easily share their creations.

Continue reading

Cloud management skills gap holds back growth

Cloud

A new study of over 800 IT professionals across the US, UK and Germany finds that 72 percent of mid-size companies report a lack of cloud management skills as being a barrier to their growth.

The study from Parallels finds 64 percent of respondents have already implemented a hybrid approach, and 38 percent of all respondents plan to further embrace a hybrid cloud approach in the next year.

Continue reading

GPU revolution: Harnessing the power of advanced technology through cloud delivery

Recent advancements in GPU (Graphics Processing Unit) technology, accompanied by new innovative use cases and increased user expectations have produced a profound impact on the industry. Together, they have driven the proliferation of new application architectures, fueling growth in artificial intelligence (AI), machine learning, and visual computing.

In this era of relentless innovation, the key to staying competitive lies in quickly meeting user expectations through cloud delivery. Its multiple advantages -- on-demand consumption, scalability, global availability, a safeguard against supply chain disruptions, and financial perks -- shape a compelling strategy for deploying GPU technology via the cloud.

Continue reading

Mastering cloud cost optimization: Strategies for efficiency and resiliency

Cloud dollars

In an era driven by digital transformation, cloud computing has emerged as a game-changer for businesses of all sizes. However, as cloud adoption continues to soar, so does the need to manage cloud costs effectively. Balancing cost reduction with maintaining and increasing resiliency has become a top priority for businesses seeking to maximize the benefits of the cloud.

The need to optimize is evident, but achieving this goal can be complicated. Without appropriate cost containment and governance strategies, organizations risk falling into a continuous climb spend pattern. Often, businesses address cost optimization as a sporadic, reactive exercise -- like making annual bulk purchases of reserved instances. To break free from this cycle and achieve sustained cost efficiency, a shift towards a collaborative, ongoing and iterative approach to cost optimization and management is a key priority.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.