Google adds new file recovery option to the new Drive for desktop app


Google upset a lot of people recently when synchronization issues caused a "small subset" of Google Drive users to lose months' of data. The number of people affected is not known, but even a small subset of a large userbase is, potentially, a huge number.
Now there is some good news. In releasing an updated version of Drive for desktop, Google is giving users access to file recovery options that should make it possible to regain access to files that were lost.
84 percent of organizations combine IT and security operations in one analytics tool


A new survey of 500 full-time security decision-makers and practitioners finds that 84 percent indicate their organization combines security and data operations into a single analytics tool.
However, the study from Observe shows more than half of the security relevant data that goes into observability systems needs to be transformed before it can be used.
Multicloud by design: Making a cloud environment that truly works


We all know the saying: you can’t have it all. The same applies to the cloud providers -- a single one cannot give and be everything you need.
Increasingly we are seeing customers demand higher standards from their cloud services in an effort to reduce savings and security risks, as well as enhance their flexibility. In a landscape that is always changing, many sectors are feeling the need to keep up with technology or even try to be one step ahead of it. To meet these complex requirements, companies may want to look a little wider than their single cloud provider set-up and into the world of multicloud.
2024 vision: Trends shaping the IT landscape


The IT and cloud computing landscape has grown and evolved in 2023, and it’s poised to continue developing in 2024. Companies worldwide are actively adapting to the dynamics of a post-pandemic world. In this pursuit of resilience and innovation, we anticipate the emergence of four key trends that will shape the new year. These trends encompass technological advancements and shifting IT paradigms regarding spending, loyalty and governance.
Here are four trends we will likely see in the new year.
Why you need a multi-layered strategy to secure the cloud [Q&A]


Recent cyber attacks have seen not just the usual monetary motives but also the rise of espionage attempts with attacks on government officials.
So how can organizations, both public and private sector, protect their most valuable assets? We spoke to Glenn Luft, VP of engineering at Archive360, to find out.
Cloud storage vulnerable to ransomware attacks


New research from Dig reveals that cloud assets like Amazon S3 buckets and Azure Storage accounts are being left open to ransomware attacks thanks to poor configuration.
It shows that only 31 percent of S3 buckets have versioning enabled, an essential for data recovery, while just two-thirds of sensitive buckets have logging enabled, a prerequisite for detection. In addition 72 percent of remote CMK buckets are not actively monitored.
AWS launches its own thin client for enterprises


As more and more organizations turn to SaaS and cloud solutions, having a powerful PC as a desktop solution becomes hard to justify, not to mention the support and security issues that come along with it.
Step forward AWS with the launch of the Amazon WorkSpaces Thin Client, aimed at enterprise workers in order to reduce an employer's technology costs and provide enhanced security.
4 best practices in cloud security to strengthen national defense in the automation age


In the era of digital transformation, national security faces complex and multifaceted challenges. To address these challenges, the Department of Defense (DOD) is taking a vigilant approach to fortify the security of cloud infrastructure.
This approach seamlessly aligns with overarching national cybersecurity initiatives, which are focused on countering a multitude of emerging threats in the age of automation. Collaboratively, the DOD and other government agencies are dedicated to strengthening the ever-evolving cloud ecosystem, while navigating an increasingly intricate threat landscape.
Addressing the risks of using bulk remediation with Google Drive [Q&A]


Bulk remediation in Google Shared Drives can be useful in removing unneeded permissions, revoking expired access and ensuring that data remains secure.
But it can also present significant challenges due to the complex nature of managing permissions across a large number of files and users. Administrators face the difficulty of ensuring accurate and appropriate access levels for each file and user.
Businesses worry more about reputational damage than financial loss following a breach


Following a cloud breach, the top three worries of businesses are reputational damage and loss of public trust (39 percent); loss of sensitive data (36 percent); and a loss of revenue generating services (35 percent).
A new report from Illumio, based on a survey of 1,600 IT and security decision makers by Vanson Bourne, finds that in the last year, nearly half of all data breaches (47 percent) originated in the cloud, and more than six in 10 respondents believe cloud security is lacking and poses a severe risk to their business operations.
96 percent of organizations vulnerable due to mismanaged secrets


A new study from Akeyless Security finds that modern DevOps and multi-cloud environments are susceptible to secrets-related breaches and that over 70 percent of organizations have had credentials, certificates and keys breached in the last two years.
Based on responses from over 200 professionals with security responsibility in organizations with over 1,000 employees, the report finds one in three security professionals have ranked secrets management among their top five priorities.
Get 'Cloud Security Automation' (worth $39.99) for FREE


For many enterprises, the move to cloud computing has raised concerns for security, but when applications are architected with focus on security, cloud platforms can be made just as secure as on-premises platforms.
Cloud instances can be kept secure by employing security automation that helps make your data meet your organization's security policy.
IT pros worry about Kubernetes security


A new survey of 800 security and IT leaders from large organizations shows 76 percent of security and IT pros believe we are heading towards a cloud reckoning in terms of costs and security.
The study from Venafi finds that 84 percent believe Kubernetes will soon be the main platform used to develop all applications. But, three-quarters worry that the speed and complexity of Kubernetes and containers is creating new security blind spots.
'Policy as code' considered vital to maintain and secure cloud software


A new survey of over 280 developers and technical decision makers finds two-thirds dealing with major flaws in homegrown authorization efficiency, security, and app performance. As a result, most organizations (83 percent) plan to invest more into policy as code as a solution.
In case you're unfamiliar with the concept, policy-as-code is an approach to policy management in which policies are defined, shared, updated and enforced using code rather than relying on manual processes.
Organizations can only stop 57 percent of cyberattacks


Over the last two years, the average organization's cybersecurity program was prepared to preventively defend against, or block, just 57 percent of the cyberattacks it encountered. This means 43 percent of attacks launched are successful and need to be remediated after the fact.
This is among the findings of a new report from Tenable, based on a survey of over 800 IT and cybersecurity leaders carried out by Forrester Consulting.
Recent Headlines
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.